Search Results | Malware
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...77 NEXT
Sort by:  Most Relevant  |  Date
To defend against today's threat environment, look to human immune system

Blog  Just as a healthy body can't dodge every bacterial infection that comes its way, so should a sound organization realize it cannot avoid getting hacked. That's how Michael Chertoff, former secretary of the U.S. Department of Homeland Security and co-founder and executive chairman at the Chertoff Grou...

Last updated: Jun 30, 2017   6:09 PM GMT  |  Blog: TotalCIO
Protecting Your Android Phone

Blog  I drop my phone at least a few times every week, usually from desktop height. And finally something bad happened from a higher than usual drop: a big crack in the screen, and the phone's protective case had a bashed-in corner. But all was not lost, In fact, due to the protective gear I had on my pho...

Last updated: Mar 18, 2015   10:10 PM GMT  |  Blog: Cheap Computing   |      'Virus`, Android, find
Bit.ly boosts malware protection

Blog  The popular link shortening service will use VeriSigns iDefense IP reputation service to detect URLs, domains and IP addresses that host malicious code. For the security-conscious, those shortened URLs on Twitter can be unnerving. After all, where is that shortened URL really taking you? This su...

Last updated: Dec 1, 2009   11:34 PM GMT  |  Blog: Security Bytes
Researcher: Beware of massive IFrame attack

Blog  Security researcher Dancho Danchev has raised the red flag in his blog about a new scam the bad guys are using to corrupt hundreds of thousands of websites with IFrame redirects. Visit one of these corrupt pages and you just might find yourself caught on another site rigged with malicious code. The...

Last updated: Mar 14, 2008   10:28 AM GMT  |  Blog: Security Bytes
Sunbelt's ClearCloud DNS Sneak Peek

Blog  Sunbelt Software, maker of Vipre Anti-Malware software, is about to release a new DNS service, ClearCloud DNS, that is designed to prevent users from inadvertently accessing dangerous websites. The service is so new, that Sunbelt hasn't even finished building their website about it. As I write, th...

Last updated: Jul 19, 2010   1:28 AM GMT  |  Blog: Security Corner
Google reaches for an application security blanket

Blog  While Google is in the news after coming under antitrust scrutiny from the U.S. Justice Department due to its planned purchase of online advertising juggernaut DoubleClick, its purchase of GreenBorder attracted, well, a bit less attention.One of the worst-kept secrets at Google is its ambitious plan...

Last updated: May 30, 2007   6:47 PM GMT  |  Blog: Channel Marker
Microsoft Security - No Longer an Oxymoron

Blog  [caption id="attachment_690" align="alignleft" width="175" caption="Source: Microsoft"][/caption] I have never been an apologist for Microsoft's security policies and practices; indeed, I've often criticized the firm and accused them of a laissez-faire attitude towards their development teams. I ha...

Last updated: May 8, 2010   4:52 PM GMT  |  Blog: Security Corner
You Clicked? Really? Are You Nuts?!

Blog  This has to be one of the most evergreen security topics to come along; no matter how much anyone writes about the dangers of clicking on links or opening attachments in unsolicited email, people continue to do it. SANS NewsBites, March 25, 2008, Vol. 10, Num. 24, begins with this statement: The Exc...

Last updated: Mar 25, 2008   9:12 PM GMT  |  Blog: Security Corner
What Is Generative Adversarial Networks (GAN)?

Blog  The Generative Adversarial Networks (GAN) is, in fact, never a single network. It is a set of networks, at least two, operating at the same place but working against each other. Each of the networks brings its own unique set of results. For instance, in GAN approach, the first network creates realis...

Last updated: May 31, 2018   6:44 AM GMT  |  Blog: Quality Assurance and Project Management   |      adversarial, Network
That Bloke Mal Ware Is A Real Threat

Blog   Was chatting with Rik Ferguson of Trend Micro about the, er, no pun intended, trends of malware and other threats earlier this week.Rik highlighted the seemingly exponential growth in aforementioned threats using Trend Micro's own figures for their own Smart Protection Network - the primary archite...

Last updated: Oct 28, 2009   1:20 PM GMT  |  Blog: Networks Generation   |      AV, AV-Test.org, Broadband-Testing
Not protecting your website is irresponsible

Blog   You wouldn't leave the house without locking the door, right? The police may not be lauded for their willingness to investigate burglaries these days, but they certainly won't be interested if the door was left open, because that is irresponsible. For many organisations, their websites are valuable...

Last updated: May 4, 2010   12:55 AM GMT  |  Blog: Bloor Security   |      Uncategorized
Thin client computing

Blog  Whilst here in Brazil, I took the opportunity to provide some input for a local company looking to implement a thin client environment in place of their existing traditional desktop user network. Personally I think thin client environments are a great idea: you immediately mitigate lots of risk to d...

Last updated: Feb 13, 2008   8:24 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Thin clients
Nine Steps to System Security - 2008

Blog  It isnt getting any better on The Wild, Wild Web, despite state and federal government attempts to arrest and prosecute those responsible for electronically-perpetrated criminal acts. Spyware and malware of all kinds are increasingly more stealthy and difficult to remove thanks to rootkit technol...

Last updated: Jul 27, 2008   4:09 PM GMT  |  Blog: Security Corner
Windows XP Tablet Edition getting error with atginahook.dll

Answer  Hello, I am troubleshooting a laptop running Windows XP Tablet Edition, and am getting errors when trying to boot into Windows. The system starts up normally, but when it gets to the login screen, it has an error message which states: "User Interface Error The Logon User Interface DLL ATGinaHook...

Last updated: Jan 10, 2008   2:49 PM GMT   |    Login, Microsoft Windows XP, Tablet
Serious security flaw found in Internet Explorer

Blog  Dear Friends users of Microsoft's Internet Explorer are being advised by experts to switch to a rival until a serious security flaw has been fixed. The flaw in Microsoft's Internet Explorer could allow criminals to take control of people's computers and steal their passwords, internet experts say. ...

Last updated: Dec 17, 2008   5:41 AM GMT  |  Blog: Network technologies and trends
Malicious Apps Sneak Into Android Market Again

Blog  A new collection of malicious Android apps was available over the Memorial Day weekend from the official Android Market app store. As many as 120,000 Android devices were compromised from the roughly 25 malicious apps before Google identified and pulled them. Because of the more open nature of Andr...

Last updated: May 31, 2011   9:08 PM GMT  |  Blog: The Security Detail
Social network security issues drive consulting and education projects

Blog  Solution providers are being called upon to guide their customers through the security maze of social networking. Whether building a Facebook page to evangelize their brand, or forming a LinkedIn group to connect with their customers, businesses must balance the benefits of social networking with ...

Last updated: Oct 12, 2011   3:20 PM GMT  |  Blog: Patrolling the Channel
Microsoft's June 2012 advance security notification lists seven bulletins

Blog  Microsoft is ringing in the summer season with seven bulletins in its latest Patch Tuesday announcement. IT pros should be on the lookout for three critical bulletins, patching Internet Explorer, .NET framework and Microsoft operating systems, to be released next week. The bulletins will address 25 ...

Last updated: Jun 7, 2012   6:52 PM GMT  |  Blog: The Windows Server Notebook
SQL injection infects more high profile websites

Blog  San Jose, Calif.-based Finjan Software Inc. has documented more than 1,000 unique websites falling victim to SQL injection attacks in the first two weeks of July. Ayelet Heyman, a Finjan security researcher said the list of sites include a large number of government and top businesses. Some of the ...

Last updated: Jul 16, 2008   1:25 PM GMT  |  Blog: Security Bytes
Vista functionality still wins over security

Blog  A researcher renowned for tinkering with Active X controls tossed a pail of ice water today at Black Hat on the security-first marketing associated with Vista. Su Yong Kim demonstrated how developers often install program files or store sensitive data in low integrity folders in order to simplify u...

Last updated: Aug 7, 2008   10:10 PM GMT  |  Blog: Security Bytes
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: