Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
No MSE 4.0 for Windows 8? Nope, not needed.

Blog  When I saw the news that Microsoft Security Essentials (4.0) had recently been released (see Paul Thurrott's Microsoft Security Essentials 4.0 blog post for more information and a download link), I quite naturally found myself wondering if MSE and Windows 8 might finally collide. When I first instal...

Last updated: Apr 27, 2012   4:21 PM GMT  |  Blog: Windows Enterprise Desktop
Malware - continuing threat (Pt. 2)

Blog  In research performed during 2005, Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy of the Department of Computer Science & Engineering at the University of Washington where 18 million URLs were crawled, spyware was found in 13.4% of the 21,100 executables discovered, and s...

Last updated: Nov 10, 2007   7:08 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware, Spyware
Linux SWAT team busts a multi-scanning move on malware nasties

Blog  Infrastructure security company OpSWAT this month releases a new version of its Metascan product for Linux deployments. The software is a 'multi scanning malware detection' tool. OpSWAT (Operations + Special Weapons And Tactics, get it?) confirms Metascan for Linux 64-bit supports: Debian, ...

Last updated: Jul 20, 2015   8:30 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
New SQL injection worm making the rounds

Blog  The trend toward large-scale attacks against Web sites through the use of SQL injection is continuing, as experts at both the SANS Internet Storm Center and Shadowserver Foundation are tracking a newly discovered SQL injection worm that appears to be exploiting a RealPlayer flaw and dropping malware...

Last updated: May 7, 2008   7:34 PM GMT  |  Blog: Security Bytes
Short-lived Web malware: Fading fad or future trend?

Blog   Attackers are increasingly spreading their malicious code through fly-by-night websites that seem legitimate to unsuspecting users, but are actually laden with malware. Marcos Christodonte II explains how short-lived Web malware works, and how enterprises can use Web filtering, honeytokens and goo...

Last updated: Apr 6, 2009   12:40 AM GMT  |  Blog: Security Wire Weekly
Joe Stewart: Botnets are hard to bring down

Blog  Botnet and malware expert Joe Stewart explains why it is difficult for security teams to take down botnets. Stewart, director of malware research at SecureWorks talks about the data that can be gleaned from command and control servers and what ISPs are doing to defend against zombie computers.

Last updated: Sep 2, 2010   3:56 PM GMT  |  Blog: Security Wire Weekly
Can malware spread from Android smartphone to Windows 10 PC?

Answer  Hello, This is a security question from my friend. He believes he has malware on his Android smartphone. He has a Windows 10 PC. Both are on the same Wi-Fi. He's worried that the malware will go to his PC. Is that even possible? Should he be concerned?

Last updated: Aug 17, 2018   4:22 PM GMT   |    Android, malware, Security
How to reinstall Wi-Fi service after removing malware

Answer  I found out today that my Android Wi-Fi contains malware (not sure how it go there). If I were to uninstall it, how can I reinstall it? My AVG antivirus found malware but I'm scared to uninstall it because I'm not sure how to reinstall it. Any thoughts?

Last updated: Nov 8, 2017   5:28 PM GMT   |    Android, Security, Wi-Fi
Panda Security Publishes Findings from 1st Annual Social Media Risk Index for SMBs

Blog  If you're not familiar with this great company, you need to be. I've written about them here on several occasions. It seems to me that in this highly competitive security industry, these people just seem to want to do it right. They have great products and they're attentive to their clients and pote...

Last updated: Sep 17, 2010   1:24 AM GMT  |  Blog: Security Corner
Google pulls malicious apps from Android Market

Blog  The Android applications contained hidden Trojan called DroidDream that attempted to gain root access to the smartphone to view sensitive data and download additional malware. Google has pulled at least 21 free applications from its Android Market late Tuesday after software developers found hidden...

Last updated: Mar 2, 2011   3:25 PM GMT  |  Blog: Security Bytes
Duqu Trojan investigation: Indian authorities seize Web hosting provider servers

Blog  Computer equipment from a data center in Mumbai have been seized as part of an investigation into the Duqu Trojan, which shares code with the notorious Stuxnet worm. Reuters has reported that computer investigators in India have seized the computer equipment that is believed to have hosted the com...

Last updated: Nov 1, 2011   1:37 PM GMT  |  Blog: Security Bytes
IE9 Best at Protecting Against Socially-Engineered Malware

Blog  NSS Labs recently tested all of the current (or at least current at the time) Web browsers to see how well each detects and prevents socially engineered malware attacks. The NSS Labs press release about the study explains: Socially engineered malware (SEM) remains the most common security threat f...

Last updated: Aug 16, 2011   10:20 PM GMT  |  Blog: The Security Detail
Are Windows PCs Threatened by Malware Harbored on Mac & Linux OS's?

Blog  Can Mac and Linux boxes harbor malware that does not affect them, but could affect Windows PCs? Absolutely. It can and does happen. The Sophos white paper, Protecting Mac and Linux computers: genuine need or nice to have? presents a convincing case, describing just how Mac and UNIX/Linux ma...

Last updated: Feb 3, 2009   3:19 AM GMT  |  Blog: Security Corner
Data security in cloud computing

Answer  Just asking for your favour for the information regarding how the following process mentioned herewith is maintained/implemented in existing Cloud architectures.Whether the following encryption/decryption of hardware related information for security aspects are followed or not YES/No in existin...

Last updated: Jul 7, 2015   6:27 PM GMT   |    Cloud Computing, Data-security, SSL
Happy New Year

Blog  Happy new year to you all. If the predictions are right then we'll be having a busy one. Just to get us into the right frame of mind for what's ahead, there's a good - and short - white paper entitled "The Online Shadow Economy" from Maksym Schipka of MessageLabs that's well worth a read. The paper...

Last updated: Jan 1, 2008   9:44 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware
How to stop malware in a ‘Flash’

Blog   Always innovating, attackers have found ways to mask their malware by placing the code into PDFs and Flash files. The malware often appears to be legitimate ads for products, and it can be particularly hard to analyze. John Strand explains why and demonstrates how to be ready for Flash-based mal...

Last updated: Nov 24, 2008   9:23 PM GMT  |  Blog: Security Wire Weekly
Vista and malicious software

Blog  Although most people seem to think of Vista as being one of the worst mistakes that Microsoft has ever made, I have never made a secret of the fact that I prefer Vista over XP. My main reason for this is that Vista is a lot less suseptible to malware infections than XP is. I have lost count of the n...

Last updated: Apr 24, 2009   2:00 AM GMT  |  Blog: Brien Posey's Windows Blog
Malware hits London hospitals

Blog  It's interesting to speculate how three seperate hospital computer systems have managed to simultaneously fall victim to malware. See Given that the rest of us have not today fallen victim to anything new, and that other hospitals appear to stil...

Last updated: Nov 18, 2008   10:06 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware, Network security
Developing Malware in the Cloud

Blog  It's official, even the bad guys use legitimate services to host and distribute malware. Security research firm Solutionary discovered Amazon Web Services was among the most-used services. Cloud services in general were proven to be easy to use and easy to scale for legitimate customers and malware ...

Last updated: Jan 20, 2014   9:37 PM GMT  |  Blog: Developing Clouds
Study highlights Web threats

Blog  At the USENIX Security Symposium in San Jose on Wednesday, a Google researcher presented a study on the pervasiveness of drive-by-downloads on the Internet, and the findings were unsettling, to say the least. Over a 10-month period last year, researchers analyzed 66 million URLs and detected more th...

Last updated: Jul 31, 2008   7:33 PM GMT  |  Blog: Security Bytes
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: