{"id":3432,"date":"2014-03-24T13:09:02","date_gmt":"2014-03-24T17:09:02","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3432"},"modified":"2020-02-26T15:08:46","modified_gmt":"2020-02-26T15:08:46","slug":"look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/3432\/","title":{"rendered":"Look at Cyberwar With Your Own Eyes: An Interactive Map of Online Threats"},"content":{"rendered":"<p>Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC.<i> <\/i>But<i> <\/i>nevertheless, you have an opportunity to see the scale and magnitude of the problem with your own eyes thanks to our map depicting malware epidemics in real time.<\/p>\n<p>In today\u2019s world, it takes minutes for new malware applications or spam to be distributed.<\/p>\n<div class=\"pullquote\">In today\u2019s world, it takes minutes for new malware applications or spam to be distributed.<\/div>\n<p>This is why all <a href=\"http:\/\/kas.pr\/free\" target=\"_blank\" rel=\"noopener\">robust anti-virus software<\/a> has long been using the Internet to study newly compromised files and the freshest threats as soon as they pop up. To find out more, you can read our article on the <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/ksn\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Network<\/a>, but in the meantime we are going to tell you about the new and exciting ways you can use KSN data. We plot this data on a map of the world in real time so you have an opportunity to compare different kinds of threats and the ways they are distributed. Which country gets more spam in the morning: Germany or USA? Who more readily clicks on malicious links: Russians or Japanese? Which country leads in terms of malware infection rates? (Hint: the answer depends on the time of the day). All of it is available on our <a href=\"http:\/\/kas.pr\/war\" target=\"_blank\" rel=\"noopener\">comprehensive cybermap<\/a> (always available at <a href=\"http:\/\/kas.pr\/war\" target=\"_blank\" rel=\"noopener\">kas.pr\/war<\/a>).<\/p>\n<p><a href=\"http:\/\/cyberwar.kaspersky.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4197\" alt=\"cyberwar2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/03\/05192309\/cyberwar2-1024x472.png\" width=\"1280\" height=\"590\"><\/a><\/p>\n<p>Now, a bit of background on how it functions. The globe spins with the help of your mouse, while the scroll wheel zooms in or out. Different types of threats are colour-coded. The button in the lower left corner serves to provide a description of each threat (certain types of threats can be configured to be hidden for your convenience). The buttons to the right of the globe help to manage a view: besides a couple of necessary buttons, like \u2018zoom\u2019 and \u2018share\u2019, the panel includes three useful switches as well. One of the buttons changes colour themes from \u2018black\u2019 to \u2018white\u2019, another allows you to change the language of the interface, and the third switches views between \u2018globe\u2019 and \u20182D map\u2019 modes.<\/p>\n<p><a href=\"http:\/\/cyberwar.kaspersky.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4198\" alt=\"cyberwar4\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2014\/03\/05192308\/cyberwar4-1024x553.png\" width=\"1268\" height=\"685\"><\/a><\/p>\n<p>By clicking on a country, you will see the number of threats detected there since 12 a.m. GMT and the position the country holds in the world\u2019s \u2018malware affection\u2019 rating. To see the list of top countries and a couple of useful graphs, use the \u2018statistics\u2019 button in the lower right corner.<\/p>\n<p>The most useful button is located in the upper right corner. It helps to spare your system the miserable fate of contributing to the sad statistics on our cybermap. To <a href=\"http:\/\/free.kaspersky.com\/?redef=1&amp;THRU&amp;reseller=cybermap_sm\" target=\"_blank\" rel=\"noopener nofollow\">check your PC for viruses free of charge<\/a> and to prevent further exposure to malware, click on \u2018Check my PC\u2019 button.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware inflicts damage to your system, yet is ephemeral and rarely visible to the naked eye, especially in digital domains beyond your own PC. But nevertheless, you have an opportunity<\/p>\n","protected":false},"author":32,"featured_media":3433,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[338,549,529],"class_list":{"0":"post-3432","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cyberwar","9":"tag-rsn","10":"tag-threats"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/3432\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/3141\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/3038\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/3447\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/4195\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/4195\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/look-at-cyberwar-with-your-own-eyes-an-interactive-map-of-online-threats\/4195\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cyberwar\/","name":"Cyberwar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3432"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3432\/revisions"}],"predecessor-version":[{"id":18962,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3432\/revisions\/18962"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3433"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}