Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...77 NEXT
Sort by:  Most Relevant  |  Date
Introducing the Anti-Malware Testing Standards Organization (AMTSO)

Blog  Security software makers have taken a step toward creating a more standardized approach for anti-malware testing, with the formation of the Anti-Malware Testing Standards Organization (AMTSO). More than 40 security software technologists and anti-malware testers from around the world recently met i...

Last updated: Feb 5, 2008   6:08 PM GMT  |  Blog: Security Bytes
ATM Malware - Part 1

Blog  A former Bank IT worker has been charged with installing malware on ATM machines with Bank of America, the amount of money that he stole is not posted anywhere that I can find but it is above $5,000. There is no specific information about the malware that he used to commit the fraud. On a related ...

Last updated: Apr 12, 2010   4:53 PM GMT  |  Blog: Irregular Expressions
The Security Threat Report (Sophos)

Blog  I just registered for this and I wanted to pass it along to all of my readers. If you want to know what's going on, these guys typically do a pretty good job of giving you the information you need and want. The Security Threat Report: A look at the latest malware and attack vectors Malware like Z...

Last updated: Jan 21, 2011   0:22 AM GMT  |  Blog: Security Corner

Blog  Beyond mere malware as a nuisance factor, (as a type we discussed the other day), we must be on guard against Controlling-Malware. This is malware that lies in wait, and is harming. These are often referred to as Trojans. Often times it is triggered by a date. It can also be triggered by the ...

Last updated: Jan 21, 2013   7:51 PM GMT  |  Blog: The Business-Technology Weave
click fraud

Blog  Click fraud is the practice of artificially inflating traffic statistics for online advertisements. In the common pay-per-click advertising model, advertisers pay a fee for each click on their ad, anticipating that they have attracted a potential customer. Continued Quote of the Day "Ad fraud bo...

Last updated: Dec 2, 2016   10:50 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Botnet, click fraud, Ransomware
Mapping malware networks

Blog  Chris Larsen, a senior malware researcher with Blue Coat Systems explains how his research team maps malware networks to gain a better understanding of attack infrastructure. Researchers at Blue Coat Systems Inc. have been mapping malware to better understand malware delivery. In the Blue Coat 2011...

Last updated: Jan 19, 2012   4:29 PM GMT  |  Blog: Security Wire Weekly
As Web access expands, experts say new malware threats cause concern

Blog  It seems nobody is safe from malware attacks these days --even the White House is taking notice. Last week, a Department of Homeland Security official acknowledged the threat of pre-existing malware on imported electronic and computer devices sold within the U.S. With the availability of malware ent...

Last updated: Jul 18, 2011   5:01 PM GMT  |  Blog: IT Compliance Advisor
Secondary Malware Scanners

Blog  Neither business nor home users should run PCs without malware or endpoint protection in place. But what one package misses another might still find, so a periodic secondary scan is also wise. That's why savvy Windows admins usually install or access secondary malware scanners at regular intervals o...

Last updated: Dec 21, 2016   10:15 PM GMT  |  Blog: Windows Enterprise Desktop   |      Malware prevention, Scan for malware, Windows 10
Red alert - automated SHIELDS Up - malware becomes smarter!

Blog  If you haven't recently kept up to date on the malware front, a recent article at DarkReading may come as a surprise to you. ALERT: Malware has become intelligent! Rare Malware A Hint Of Threats To Come shows that malware has come a long way and has gained some significant intelligence to avoid det...

Last updated: Aug 24, 2009   8:33 PM GMT  |  Blog: IT Trenches
One-Third of All Malware Created in First 10 Months of 2010

Blog  On Wednesday, PandaLabs, Panda Securitys anti-malware laboratory, reported that one-third of all malware in existence was created in the first 10 months of 2010. The average number of malware threats created every day, including new malware and variants of existing families, has risen from 55...

Last updated: Nov 28, 2010   5:59 PM GMT  |  Blog: Security Corner
RSA 2011 redux: Cloud risks, mobile threats, targeted attacks

Blog  The SearchSecurity editorial team discusses the themes that emerged from the 2011 RSA Conference. While cloud computing risks continued to be top of mind, attendees heard about threats to mobile devices and the growing number of successful targeted attacks against enterprises. Show notes: Cloud co...

Last updated: Mar 9, 2011   2:05 PM GMT  |  Blog: Security Wire Weekly
Duqu Trojan - Dangerous malware shares Stuxnet code

Blog  Jason Lewis, CTO of Lookingglass Cyber Solutions talks about the new Duqu malware. Lewis, a former global network exploitation and vulnerability analyst with NSA, said it was likely authored by a nation state, given the time and resources it takes to develop a sophisticated piece of malware. Progra...

Last updated: Oct 19, 2011   4:05 PM GMT  |  Blog: Security Wire Weekly
What malware remover is out there for me?

Answer  Is there a malware remover for Locky, Cryptowall, and Zepto malware?

Last updated: Jan 16, 2017   12:36 AM GMT   |    Antimalware, malware, Security
Emerging Asia most vulnerable to malware

Blog  Bangladesh and Pakistan have the highest malware encounter rates around the world, followed by two other countries in the ASEAN region Cambodia and Indonesia, according to Microsofts latestSecurity Intelligence Report. That those countries were most susceptible to malware is hardly surpris...

Last updated: Aug 24, 2017   8:30 AM GMT  |  Blog: Eyes on APAC
How Safe Is Your Enterprise Backup Data from Malware Attack? @asigra

Blog  How many CIOs and CTOs can surely claim that their enterprise backup that is being taken regularly is not contaminated with any kind of Malware. A recent report published by DCIG features cybersecurity approaches from the legends in the field like Asigra, Rubrik, and Dell. Detecting and preventing m...

Last updated: Jul 10, 2019   4:28 PM GMT  |  Blog: Quality Assurance and Project Management   |      Asigra, Backup and restore, Backup Recovery and Media Services
Web-based malware: Driveby downloads on the information superhighway

Blog  Last week Google researchers Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu released a report called "The Ghost In The Browser: Analysis of Web-based Malware. The report concludes that infected Web sites are responsible for spreading most of the worlds malwa...

Last updated: May 21, 2007   2:56 AM GMT  |  Blog: Our Latest Discovery
Do you see mobile malware becoming a dangerous trend for BYOD?

Answer  In a recent report, FortiGuard Labs has seen a 30% uptick in mobile malware and is tracking over 250,000 unique malicious Android samples, along with 300 unique malicious Android families. The company says while BYOD is still a fast-growing trend, malware could affect both an employee's device and t...

Last updated: Aug 7, 2013   6:58 PM GMT   |    BYOD, malware, Mobile
HD Moore on the Stuxnet Trojan

Blog  Metasploit creator HD Moore talks about the Stuxnet Trojan, the evolution of malware and his role at Rapid7. Program links: HD Moore, Rapid 7 release Metasploit Pro: Metasploit Pro brings enhanced remote access and collaboration capabilities to the popular exploit framework. Stuxnet Trojan attack...

Last updated: Oct 21, 2010   12:50 AM GMT  |  Blog: Security Wire Weekly
Built-in Malware Scanning via MRT.exe

Blog  There are times on Windows PCs when a malware scan is a good idea, even if some kind of anti-malware program is resident. That's probably why Microsoft updates its own malware scanning tool, known as the Malicious Software Removal Tool aka MRT.exe, on a monthly basis. It also runs that tool at the s...

Last updated: Jun 6, 2016   2:23 PM GMT  |  Blog: Windows Enterprise Desktop   |      anti-malware, Windows 10
Malwarebytes expands, targets SMB

Blog  Until this week, Malwarebytes went about its business of tracking and removing malware pretty quietly. But on Monday, the company went public so to speak, announcing that it recently reached 100 million downloads, completed an acquisition, expanded its operations, and is developing a version of its ...

Last updated: Jul 19, 2011   9:21 PM GMT  |  Blog: Security Bytes
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: