Search Results | Malware
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...76 NEXT
Sort by:  Most Relevant  |  Date
exploit kit

Blog  An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continued Quote of the Day "Exploit kits make the job of an attacker much easier but can be defended against easily by understanding the vu...

Last updated: Jan 11, 2017   8:06 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      malware, Threat actor
Panda's Cloud Antivirus (Beta) is a Winner!

Blog  I've been using Panda Security's free Cloud Antivirus for awhile and I must say I'm impressed. It's there, but you'll never know it unless you look (the little panda icon in the system tray). I rarely get malware of any kind, but Cloud AV has caught a couple of things that were probably drive-bys. I...

Last updated: Jun 30, 2009   3:19 PM GMT  |  Blog: Security Corner
CastleCops Shuts Down Operations

Blog  CastleCops, the largest and most effective volunteer security community on the Internet, has shut down operations. Their website has this announcement posted: You have arrived at the CastleCops website, which is currently offline. It has been our pleasure to investigate online crime and volunteer...

Last updated: Dec 30, 2008   8:33 PM GMT  |  Blog: Security Corner
Preparing for the Coming Storm

Blog  Its comforting to read those security threat level indicators that inform us that the threat from malware attacks is currently low. Unfortunately there are blind spots in early warning systems. Theyre based on intelligence rather than real intent. The reality is that we dont know when a big...

Last updated: Oct 6, 2007   11:46 AM GMT  |  Blog: David Laceys IT Security Blog   |      People, threats, vulnerability management
The Great Internet Blackout is coming July 9

Blog  If you are still infected with the DNS Changer malware, you will be unable to access the internet as of July 9, 2012. According to the FBI, who took over a series of rogue DNS servers last November, there are still hundreds of thousands of computers infected with the malware. While the FBI substit...

Last updated: Jul 6, 2012   1:12 PM GMT  |  Blog: Security Corner
A Worrying Trend in Malware

Blog  Techworld reports a disturbing trend in the sophistication of malware. The problem is that it's declining. Alexander Gostev, Head of Kaspersky Lab, points out that higher volumes of low-quality malware are taxing the resources of security companies. The quality is down but the quantity is up. This...

Last updated: Dec 20, 2006   9:28 PM GMT  |  Blog: David Laceys IT Security Blog   |      crisis, incidents, threats
Where can I find info on recent malware updates?

Answer  Where can I find info on recent malware updates? This question is from the Microsoft Live Chat which took place on July 13th.

Last updated: Jul 29, 2010   8:07 PM GMT   |    malware, Security
Spear phishing and targeted attacks

Blog  Catalin Cosoi, head of the online threats lab at BitDefender on spam and malware analysis, the Waledac spambot takedown and the hacktivism trend.

Last updated: Aug 17, 2011   8:56 PM GMT  |  Blog: Security Wire Weekly
Hackers are Hitting Macs with a Major Virus

Blog   Word comes that more than 500,000 Macintosh machines are potentially infected with a virus one that is specifically targeting Macs: Its called Flashback Trojan. The virus is a variation on one that is normally aimed at PCs - typically powered by a Microsoft (MS) Windows operating sy...

Last updated: Apr 8, 2012   6:58 PM GMT  |  Blog: The Business-Technology Weave
Site recovers files locked by Cryptolocker ransomware

Blog  A new website has been launched that victims of the Cryptolocker malware can use to recover their files for free instead of paying the cybercrooks' ransom. From Krebs on Security: ...early Wednesday morning, two security firms Milpitas, Calf. based FireEye and Fox-IT in the Netherlands launc...

Last updated: Aug 7, 2014   1:53 PM GMT  |  Blog: Security Corner   |      CryptoLocker, malware, Ransomware
How to hack guide

Blog  Cyber criminals are not after the notoriety anymore, they are business men or women just like in the real world and networking is helping them become stronger. The internet is increasingly becoming a lucrative platform for illegal business ventures. Raimund Genes, CTO of anti-malware at Trend ...

Last updated: Apr 16, 2008   6:08 PM GMT  |  Blog: Networks Generation   |      Social networking
PC Tools Posts Startup and Efficiency Gains in 2011 Versions

Blog  It's not often that fate conspires to show me how new software changes system behavior, without me having to jump through lots of extra hoops to gather the necessary data. But because of the confluence of two sets of unrelated events this week, that's exactly what happened as I started learning my w...

Last updated: Sep 17, 2010   4:06 PM GMT  |  Blog: Windows Enterprise Desktop
virus or malware

Answer  I have a pop-up reminder that I need to know if it's a virus/malware or something else. Can i send a screen shot?

Last updated: Sep 20, 2012   2:11 PM GMT   |    malware, Security, Viruses
How do I recover zip files?

Answer  My computer had a malware attack. Due to the attack, many of my zip files got corrupted. Can somebody suggest me how can I recover it?

Last updated: Feb 6, 2017   11:22 AM GMT   |    Zip Files
Deprecate Java Browser Plug-in: end of MitB attacks?

Answer  Will the deprecating of Java Browser plug-in help stop the MitB attacks in anyway? Since MitB malware is a type of browser plug-in.

Last updated: Sep 21, 2016   6:19 PM GMT   |    malware, MitB, Security
Disable Firefox headless mode

Answer  For security purposes, can I disable headless mode in FireFox? My friend told me that this mode leads to adware / malware. How can I do this?

Last updated: Jun 23, 2017   1:02 PM GMT   |    Firefox
"Malware in your system? Good"

Blog  Who really thinks that allowing to protect IP (intellectual property) by locking it in with malware is such a great idea? Who?! Basically the idea is to stop pirating software and people stealing software and other IP. The law would give the creator rights to basically have a backdoor to the vi...

Last updated: May 30, 2013   11:43 PM GMT  |  Blog: I.T. Security and Linux Administration
Flame malware authors

Blog  I don't think it's surprising to hear that it was agovernmentbehind the development of the Flame malware. What I am shocked to hear is that there is sources directly confirming this. This is a direct attack by governments...

Last updated: Jun 22, 2012   3:58 AM GMT  |  Blog: Irregular Expressions
Attackers target PDF, DirectShow flaws with malicious banner ads

Blog  Advertising networks DoubleClick, YieldManager and FastClick have supplied a series of malicious banner ads to several popular legitimate websites this week. Security vendor ScanSafe says it has discovered a series of malicious banner ads appearing on popular websites, including, ...

Last updated: Sep 24, 2009   1:42 PM GMT  |  Blog: Security Bytes
Symantec outs Android vigilante app justice

Blog  By Ryan Cloutier, Contributor New among the rapidly growing mobile malware landscape is Android.walkinwat; however, instead of the usual black hat aims of normal malware this version seeks to deter victims from downloading pirated software. Walkinwat attracts victims by posing as a version of a le...

Last updated: Mar 31, 2011   7:12 PM GMT  |  Blog: Security Bytes
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: