Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Cisco ASA FirePOWER Services Licensing

Blog  In order to have the full Next Generation Features enabled on the Cisco ASA FirePOWER Module one should ensure that they have appropriate licenses. Currently Cisco is offering follow licenses for Cisco ASA FirePOWER Services License Types License Type Service Subscription need to be purc...

Last updated: Aug 29, 2016   3:53 PM GMT  |  Blog: Network technologies and trends   |      ASA, Cisco, detection
Adobe uses artificial intelligence for 'first response' anti-malware combat

Blog  Adobe has recently unveiled a malware classification tool intended to give security research professionals and "incident first responders" a more powerful means of identifying malicious binary files. ... and it's open source, publicly available under the BSD license. Falling under the remit and pu...

Last updated: Apr 5, 2012   7:14 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Symantec Report: Rise in Attacks Targeting Mobile Users

Blog  TheJuly edition of the Symantec Intelligence report combinesresearch and analysis from the Symantec.cloud MessageLabs Intelligence Report, and the Symantec State of Spam & Phishing Report to provideanalysis of cyber security threats, trends and insights from the Symantec Intelligence team ...

Last updated: Jul 27, 2011   8:48 PM GMT  |  Blog: The Security Detail
Microsoft Exploits Android Malware to Promote WP7

Blog  Android is under fire from all sides. It has the attention of mobile malware developers, and now Microsoft is hoping to capitalize on recent Android malware news as a marketing stunt for Windows Phone 7. Google's mobile operating system has skyrocketed to the top of the smartphone heap, and has a...

Last updated: Dec 15, 2011   4:41 PM GMT  |  Blog: The Security Detail
NetWitness' CSO on targeted malware

Blog  Eddie Schwartz, CSO of network analysis firm NetWitness, talks about targeted malware and the company's new Spectrum malware analysis platform.

Last updated: Jan 28, 2011   2:36 PM GMT  |  Blog: Security Wire Weekly
Anti-Malware Testing Standards Organization

Blog  More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO. The formation of AMTSO has been driven by industry-wide concern about the increasing mismat...

Last updated: Feb 10, 2008   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      AMTSO, malware
What is Log Pos malware?

Answer  What is LogPos malware like date of the malware detected, coding language, command and control channel, infecting mechanism, hiding mechanism, impact till date?

Last updated: Jul 19, 2015   12:24 AM GMT   |    malware
Malware writers and memory dumping

Blog  Jibran Ilyas, a computer forensics investigator and malware researcher and Nicholas J. Percoco, senior vice president of Trustwaves SpiderLabs team talk about malware sophistication and memory dumping techniques.

Last updated: Nov 3, 2010   2:08 PM GMT  |  Blog: Security Wire Weekly
Malware - continuing threat (Pt. 1)

Blog  I asked the other day if "we no longer perceive malware as being such a high priority?" According to the 2007 CSI Computer Crime & Security Survey, virus attacks impacted 52% of survey respondents during the last 12 months and accounted for over US$8.3million worth of losses. That was still onl...

Last updated: Nov 9, 2007   3:00 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware, zero-day
Malware removal from a Windows XP laptop

Answer  My question: How do I remove malware in a Windows XP laptop? The malware appears to be a Trojan horse. The registry seems to be affected. What is the best resolve? thanks

Last updated: Mar 13, 2008   11:33 PM GMT   |    malware, Security, Trojans
Don't Take Candy from Strangers, or IBM

Blog  We at the IT Watch Blog appreciate irony as much as the next guy, but IBM's recent faux pas might be pushing it. The AusCERT conference boasts that it is the "premier IT security event for IT security professionals and anyone with an interest in IT security." Maybe so, but that doesn't mean conferen...

Last updated: May 25, 2010   8:05 PM GMT  |  Blog: Enterprise IT Watch Blog
industrial control system (ICS)

Blog  Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued Quote of the Day "Today, it is commonplace to find engineering workstations and servers on the ICS networks...

Last updated: Aug 22, 2017   8:04 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Operational technology, SCADA, Targeted Attacks
Golden Rule #12: Infected PC? Dont Just CleanWipe and ReloadGolden Rule #12: Infected PC? Dont Just CleanWipe and Reload

Blog  Youve seen them: PCs with serious malware infections that seem to defy any and all attempts to clean them up. You persevere and eventually get rid of the files that regenerate upon deletion, clean up the autorun registry entries that keep the malware going, and kill all the malicious processes th...

Last updated: Dec 13, 2009   11:09 PM GMT  |  Blog: Security Corner
‘Massive’ malware barrage poisoning search sites

Blog  Those using Google, Yahoo! and other search engines face a new danger according to the folks at Sunbelt Software: seeded search results that will redirect the user to sites rigged with malware. The Sunbelt blog describes tens of thousands of individual pages its researchers found that have been met...

Last updated: Nov 28, 2007   12:26 AM GMT  |  Blog: Security Bytes
Joe Stewart on Flame malware, botnet sophistication

Blog  Flame was designed as a monolithic framework to enable people to carry out attacks without having deep knowledge of software coding or the way malware works, said Joe Stewart, director of malware research at Dell Secureworks. //

Last updated: Jul 5, 2012   1:22 PM GMT  |  Blog: Security Wire Weekly
Overheard - How a windshield becomes an attack vector

Blog   An enterprising group of criminals has been using a real-world scam in an effort to spread malware. The attacks reportedly began with a series of phony parking tickets issued in Grand Rapids, North Dakota. Individuals had the tickets placed under their windshields along with instructions to vis...

Last updated: Feb 5, 2009   4:14 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Defending against RAM scraper malware in the enterprise

Blog  A new type of malware attack, RAM scraper, may pose a serious threat to enterprise security. Learn what a RAM scraper attack is, and how you can defend your organization from this potentially damaging new malware attack.

Last updated: Feb 18, 2010   6:16 PM GMT  |  Blog: Security Wire Weekly
Malware search redirects

Answer  Hi, can anyone tell me how long this type of malware has been about. I can see that search redirect malware seems to be very prolific right now, but how many years has this been going on. Thanks

Last updated: Apr 30, 2009   2:10 AM GMT   |    Google, malware
Survey Uncovers Risky Misperceptions on Security

Blog  G Data Software has released a global survey that shows PC users are in the dark about the reality of todays malware threats. G Data surveyed nearly 16,000 PC users worldwide, including more than 5,500 Americans, and found that risky behavior and misconceptions are rampant online. Here are so...

Last updated: Jun 24, 2011   2:39 PM GMT  |  Blog: The Security Detail
Rogue antivirus skyrockets, Trojans continue to dominate, PandaLabs finds

Blog  Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to PandaLabs, the research arm of Panda Security. It looks like the cybercriminals behind rogue antiviru...

Last updated: Jan 5, 2011   3:33 PM GMT  |  Blog: Security Bytes
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: