Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...73 NEXT
Sort by:  Most Relevant  |  Date
What malware remover is out there for me?

Answer  Is there a malware remover for Locky, Cryptowall, and Zepto malware?

Last updated: Jan 16, 2017   12:36 AM GMT   |    Antimalware, malware, Security
Cure for Malware Antivirus 2009

Answer  Anybody know a cure for malware Antivirus 2009?

Last updated: Nov 14, 2008   6:45 PM GMT   |    Antivirus, malware
What is Log Pos malware?

Answer  What is LogPos malware like date of the malware detected, coding language, command and control channel, infecting mechanism, hiding mechanism, impact till date?

Last updated: Jul 19, 2015   12:24 AM GMT   |    malware
NetWitness' CSO on targeted malware

Blog  Eddie Schwartz, CSO of network analysis firm NetWitness, talks about targeted malware and the company's new Spectrum malware analysis platform.

Last updated: Jan 28, 2011   2:36 PM GMT  |  Blog: Security Wire Weekly
Removable media scanned for malware

Answer  Why should removable media be scanned for malware on-demand and/or upon insertion?

Last updated: May 24, 2014   7:48 PM GMT   |    malware
Use two computers: One for Internet and the other to work offline for safety

Answer  How to I keep my main computer safe from malware by using two computers?

Last updated: Oct 27, 2015   10:16 PM GMT   |    Computers, Security
Malware removal from a Windows XP laptop

Answer  My question: How do I remove malware in a Windows XP laptop? The malware appears to be a Trojan horse. The registry seems to be affected. What is the best resolve? thanks

Last updated: Mar 13, 2008   11:33 PM GMT   |    malware, Security, Trojans
Joe Stewart on Flame malware, botnet sophistication

Blog  Flame was designed as a monolithic framework to enable people to carry out attacks without having deep knowledge of software coding or the way malware works, said Joe Stewart, director of malware research at Dell Secureworks. //

Last updated: Jul 5, 2012   1:22 PM GMT  |  Blog: Security Wire Weekly
Malware writers and memory dumping

Blog  Jibran Ilyas, a computer forensics investigator and malware researcher and Nicholas J. Percoco, senior vice president of Trustwaves SpiderLabs team talk about malware sophistication and memory dumping techniques.

Last updated: Nov 3, 2010   2:08 PM GMT  |  Blog: Security Wire Weekly
Defending against RAM scraper malware in the enterprise

Blog  A new type of malware attack, RAM scraper, may pose a serious threat to enterprise security. Learn what a RAM scraper attack is, and how you can defend your organization from this potentially damaging new malware attack.

Last updated: Feb 18, 2010   6:16 PM GMT  |  Blog: Security Wire Weekly
Malware search redirects

Answer  Hi, can anyone tell me how long this type of malware has been about. I can see that search redirect malware seems to be very prolific right now, but how many years has this been going on. Thanks

Last updated: Apr 30, 2009   2:10 AM GMT   |    Google, malware
Tidserv request 2 attack: Virus or malware?

Answer  Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

Last updated: Oct 26, 2010   5:01 PM GMT   |    Antivirus, backdoors, malware
Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

Answer  Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

Last updated: Jun 22, 2009   3:19 PM GMT   |    malware, Microsoft virtualization, Microsoft Virtualization Chat 5/14
More Mac fake AV stuff

Blog  http://nakedsecurity.sophos.com/2011/05/18/malware-on-your-mac-dont-expect-applecare-to-help-you-remove-it/

Last updated: May 19, 2011   4:40 AM GMT  |  Blog: Irregular Expressions
Duqu Trojan - Dangerous malware shares Stuxnet code

Blog  Jason Lewis, CTO of Lookingglass Cyber Solutions talks about the new Duqu malware. Lewis, a former global network exploitation and vulnerability analyst with NSA, said it was likely authored by a nation state, given the time and resources it takes to develop a sophisticated piece of malware. Progra...

Last updated: Oct 19, 2011   4:05 PM GMT  |  Blog: Security Wire Weekly
Mapping malware networks

Blog  Chris Larsen, a senior malware researcher with Blue Coat Systems explains how his research team maps malware networks to gain a better understanding of attack infrastructure. Researchers at Blue Coat Systems Inc. have been mapping malware to better understand malware delivery. In the Blue Coat 2011...

Last updated: Jan 19, 2012   4:29 PM GMT  |  Blog: Security Wire Weekly
Do you see mobile malware becoming a dangerous trend for BYOD?

Answer  In a recent report, FortiGuard Labs has seen a 30% uptick in mobile malware and is tracking over 250,000 unique malicious Android samples, along with 300 unique malicious Android families. The company says while BYOD is still a fast-growing trend, malware could affect both an employee's device and t...

Last updated: Aug 7, 2013   6:58 PM GMT   |    BYOD, malware, Mobile
Anti-Malware Testing Standards Organization

Blog  More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO. The formation of AMTSO has been driven by industry-wide concern about the increasing mismat...

Last updated: Feb 10, 2008   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      AMTSO, malware
isearch toolbar

Answer  Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

Last updated: Apr 12, 2005   10:34 PM GMT   |    Administration, Documentation, Features/Functionality
ATM Malware - Part 1

Blog  A former Bank IT worker has been charged with installing malware on ATM machines with Bank of America, the amount of money that he stole is not posted anywhere that I can find but it is above $5,000. There is no specific information about the malware that he used to commit the fraud. On a related ...

Last updated: Apr 12, 2010   4:53 PM GMT  |  Blog: Irregular Expressions
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...73 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: