• Regin malware: Why did it take so long to uncover?

    Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.

    Brandan1,055 pointsBadges:
  • How to mitigate the risk of Web malware infections with separation

    Web malware is a significant threat to systems. This video explains how separation effectively reduces the risk of damage from Web-borne malware.

    ITKE351,965 pointsBadges:
  • Can the new iBanking Android malware be stopped?

    The iBanking malware has evolved to target Android devices. Enterprise threats expert Nick Lewis offers pointers on how to detect this malware on Android as well as prevent the threat.

    searchsecurity21,265 pointsBadges:
  • How to defend against brute-force router attacks from Sality malware

    The Sality malware has reemerged with new capabilities: brute-forcing passwords on wireless access points. Enterprise threats expert Nick Lewis explains how to.

    searchsecurity21,265 pointsBadges:
  • How does your enterprise detect jailbroken devices and remediate the risks?

    searchsecurity21,265 pointsBadges:
  • Defend against password-stealing malware on jailbroken iOS devices

    A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk.

    searchsecurity21,265 pointsBadges:
  • Report: Backoff malware infections spiked in recent months

    A report from security vendor Damballa shows that the Backoff malware variant has infected an increasing number of point-of-sale systems in recent months.

    Brandan1,055 pointsBadges:
  • How to detect fraudulent certificates that look real

    Malware using seemingly real digital certificates is becoming more prevalent. Expert Nick Lewis discusses how to detect fraudulent certificates.

    searchsecurity21,265 pointsBadges:
  • Conduit browser hijacker

    Conduit is a browser hijacker that is usually installed without the user’s knowledge through a drive-by download. The malware, which is frequently bundled with freeware and shareware, presents as a browser toolbar and search engine. Once installed, Conduit changes the user’s default browser...

    ITKE351,965 pointsBadges:
  • form grabber

    A form grabber is a type of malware that captures data such as IDs and passwords from browser forms. The target of a form grabber is the user’s Internet banking information. Form grabbers typically gain access through a Trojan horse.

    ITKE351,965 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following