Search Results | Malware
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...76 NEXT
Sort by:  Most Relevant  |  Date
The Year In Security: A Look Back at 2011 and Trends for 2012

Blog  Sir Winston Churchill once said, Those who fail to learn from history are doomed to repeat it. Those are wise words, and a sentiment that applies nicely to information security. As we begin 2012, it is a great time to reflect on the significant security events that occurred over the last year,...

Last updated: Jan 5, 2012   4:20 AM GMT  |  Blog: The Security Detail
Cryptojacking infections are coming from inside your home

Blog  Cryptojacking has become a growing concern. Cybercriminals aren't satisfied with the available supply of vulnerable servers and PCs to hijack in order to mine their favorite cryptocurrency. So, they have added another rich source of computational horsepower to their arsenal: IoT devices. Media devic...

Last updated: Aug 31, 2018   4:55 PM GMT  |  Blog: IoT Agenda   |      Access control, Botnet, Consumer IoT
IoT exploit activity has quadrupled -- are you prepared?

Blog  The evolution of malware is being fueled largely by the proliferation of IoT. According to Gartner data, there were about 8 billion connected "things" in 2017. But that number is expected to nearly triple to more than 20 billion in just the next two years, which averages out to roughly three connect...

Last updated: Feb 22, 2018   6:18 PM GMT  |  Blog: IoT Agenda   |      Botnet, cybersecurity, Enterprise IoT
Windows 8.1 Brings Added Security to the Table

Blog  It's probably part of Microsoft's push to extend uptake of Windows 8.1 beyond the enthusiast/home user level, but I'm seeing some very interesting security improvements in Windows 8.1. Some of them appear designed specifically to appeal to corporate/enterprise users. Here's a partial list, lifted fr...

Last updated: Jul 19, 2013   8:43 PM GMT  |  Blog: Windows Enterprise Desktop
We must be careful about what we do on the internet: Part 3

Blog  In "We must be careful about what we do on the internet: Part 1" and "We must be careful about what we do on the internet: Part 2," Hunter Mitchell discussed fake AV and P2P file sharing sites noting the dangers and how to avoid them. In this post, he gives some great advice on how to identify dange...

Last updated: Aug 22, 2012   1:35 AM GMT  |  Blog: Security Corner
Heartland 'low and slow' data breach not likely at SMBs?

Blog  Reporters hear this a lot when it comes to SMB security: The security risks facing small and medium-sized businesses (SMBs) are often identical to those at big companies, only different in scale. The spam and viruses coming through email are as much a plague on SMBs as they are on the big guys. Ditt...

Last updated: Jan 30, 2009   4:09 PM GMT  |  Blog: CIO Symmetry
Security researchers uncover more cyber spying

Blog   Cyber warfare continues to be a controversial topic, but security researchers continue to uncover evidence of covert activities that involve stealing military-related information. The latest evidence of this kind of activity has been highlighted by researchers at AlienVault Labs, who say China-bas...

Last updated: Jan 4, 2012   3:11 PM GMT  |  Blog: Read all about IT!   |      AlienVault, McAfee, Sykipot
Computers for non-profit organizations hit hard by malware

Blog  SAN FRANCISCO -- While it may not be a security pro's worst nightmare, it certainly wouldn't be considered a pleasant dream. In 2009, David Compton, system administrator for Aspire of Western New York, a non-profit that serves people with developmental disabilities at over 50 group homes and field l...

Last updated: Feb 17, 2011   10:49 PM GMT  |  Blog: Security Bytes
WinNT/Exforel.A

Blog  This is the most advanced backdoor that I have seen published in a while. WinNT/Exforel.A This is why it is important to have multiple layers of defense and not just rely on host based detection. This is also one of my personal interests with malware, command and control; - In tor. - Twitter. - I...

Last updated: Dec 30, 2012   4:07 AM GMT  |  Blog: Irregular Expressions
Sound Trojan for Smartphones

Blog  This is an interesting paper It introduces some work called Soundminer, "a stealthy and context-aware sound Trojan for smartphones". It explores the threat of smartphone malware with access to on-board sensors, which opens new avenues for secret collection of private information. The trojan intell...

Last updated: Feb 9, 2011   4:17 PM GMT  |  Blog: Bloor Security   |      Nigel Stanley, Security, smartphone
Scan computer so my computer won't be infected by malware / hacking program

Answer  Is there a program that can scan my computer that I can buy and install on my computer that WON'T become infected with any malware of hacking program that may already be on my computer? I have this consistent problem of antivirus becoming infected then won't detect a problem. Every once in a while m...

Last updated: Jul 14, 2016   10:41 AM GMT   |    Hacking, malware, Security
Researcher boasts of Mac worm

Blog  Here's more evidence that the digital underground is increasingly interested in targeting Apple's Mac OS X, which many consider the more secure alternative to Microsoft Windows: An unnamed researcher is using the Information Security Sell Out blog to boast about a new Mac OS X worm he or she create...

Last updated: Jul 17, 2007   11:36 AM GMT  |  Blog: Security Bytes
TechTarget's weekly roundup (1/13 - 1/20)

Blog   Microsoft Windows image via Shutterstock Are you getting nervous about migrating off Windows XP? Well, in this week's roundup, you'll find out why you can breathe a sigh of relief for a little longer. 1. Windows XP anti-malware support extended until 2015, buys IT time - Diana Hwang (SearchEnterpr...

Last updated: Jan 20, 2014   1:37 PM GMT  |  Blog: Enterprise IT Watch Blog
Windows zero-day flaw used in Duqu attacks

Blog  Security researchers said Tuesday the Duqu Trojan used a Word document that exploits a Microsoft zero-day vulnerability in order to infect computers. Microsoft said it's working to address the flaw. Researchers at the Laboratory of Cryptography and System Security (CrySys) in Budapest, Hungary, unc...

Last updated: Nov 1, 2011   11:11 PM GMT  |  Blog: Security Bytes
Sysinternals Updates for Last Month

Blog  Here are the latest updates from Sysinternals! What's New (June 20, 2013) Marks TechEd Sessions Available On-Demand Mark delivered four top-rated sessions at Microsofts TechEd US conference two weeks ago, and the recordings are available now for on-demand viewing. In Windows Azure Infrastr...

Last updated: Jul 5, 2013   4:18 PM GMT  |  Blog: The Real (and Virtual) Adventures of Nathan the IT Guy
Are Next Generation Firewalls capable of supporting SSL/TLS interception?

Blog  These days most of the traffic passes though various network is SSL/TLS. People used to believe by using SSL encryption they are free from attacks and can protect their organisations from any call backs, malware etc. However trends are changing as attackers are capable of sending malware in the en...

Last updated: Jan 27, 2017   2:39 PM GMT  |  Blog: Network technologies and trends   |      Bluecoat, encrypted, F5
Beware Halloween tricks: Malware is no treat

Blog  The bad guys love to trick people into downloading their malicious garbage and will use just about any tactics to do so. Its Halloween season, so people will be searching for all kinds of scary stuff to decorate, dress up and generally celebrate the creepy. The hackers know this and will have alr...

Last updated: Oct 28, 2013   11:38 PM GMT  |  Blog: Security Corner
Hannaford Redux - Another Break-in From the Inside

Blog  The sixth largest US credit card payment processor Heartland Payment Systems, has just acknowledged that their payment systems have been breached. The discovery of malware by forensic auditors on the system last week has led to this announcement. Credit card payment processors have to jump through ...

Last updated: Jan 20, 2009   9:03 PM GMT  |  Blog: Sister CISA CISSP
CAPTCHA

Blog  A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic software programs. Continued Quote of the Day "CAPTCHA challenge tests include image and text challenges, as well as an audio test option to ensure that users with visual impairments can respond." - Mi...

Last updated: Aug 17, 2017   7:17 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      image captcha
Microsoft Windows Defender

Blog  Windows Defender is Microsoft's antimalware software. Defender works with Windows Update to automatically install new virus definition files as they are published and provide computers using the Microsoft operating system (OS) with both real-time and anytime scanning options. Continued Quote of ...

Last updated: Aug 18, 2017   6:24 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Antimalware, Windows Defender
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: