Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Ransomware - How Malware Can Cost You Real Money

Blog  We have all heard the malware horror stories, but what I read about today takes it to a whole new level. It seems that the new trend is not to just install malware and change your default search engine or load "virus detection software" that finds a dozen or so viruses. It also tells you the only ...

Last updated: Apr 16, 2010   1:40 PM GMT  |  Blog: Can you hear me now? Tales from a Cisco voice instructor
Serious IFrame attacks spread Trojan cocktail

Blog  Security researchers at Web security services vendor ScanSafe have tracked a successful IFrame attack infecting nearly 55,000 website pages with code that infects victim machines with a Trojan downloader that installs a potent mixture of malware. Mary Landesman, a senior security researcher at Scan...

Last updated: Aug 25, 2009   12:46 AM GMT  |  Blog: Security Bytes
"Here you have" email worm spreads

Blog  An old-style email worm was spreading Thursday, antivirus vendors reported. The malware, named "Here you have" for the message it carries in the subject line, includes a link that appears to be a PDF file but instead is a malicious program, according to McAfee. If someone clicks on the link, the ma...

Last updated: Sep 10, 2010   2:06 AM GMT  |  Blog: Security Bytes
Overheard: Google says you'll find web-based malware in 1% of all search results

Blog   It has been over a year and a half since we started to identify web pages that infect vulnerable hosts via drive-by downloads, i.e. web pages that attempt to exploit their visitors by installing and running malware automatically. During that time we have investigated billions of URLs and found m...

Last updated: Feb 18, 2008   2:25 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Overheard - BIOS attack

Blog   "Until now, common wisdom has been that the large variety of BIOS implementations means it is unfeasible for attackers to create portable, widespread BIOS malware. Core's researchers proved this wrong." Sherri Davidoff, BIOS can become a source of malware According to Core's CTO, Ivan Arce, t...

Last updated: Jul 13, 2009   5:14 PM GMT  |  Blog: Word of the Day: Tech Definitions from
New drive-by attack technique better evades signatures

Blog  Drive-by cache attack silently loads malware into the browser cache By Ryan Cloutier, Contributor Researchers at Armorize Technologies have discovered a more sophisticated drive-by download attack that uses zero-day vulnerabilities and a technique designed to dupe signature-based antivirus. Wayne...

Last updated: Apr 20, 2011   1:37 PM GMT  |  Blog: Security Bytes
Google Android Trojan surfaces in China

Blog  Users of Android smartphones in China could be infected by Geinimi malware if mobile applications are downloaded from third-party services. Security researchers at mobile security firm Lookout Inc. have discovered a new Trojan designed to compromise smartphones running Googles Android operating ...

Last updated: Jan 3, 2011   2:33 PM GMT  |  Blog: Security Bytes
The Gods Must Be Crazy...Or, At Least ZeuS

Blog  In Greek mythology, Zeus was the head honcho. But, he was a capricious, fallible, often vengeful god (aren't they all?). Zeus seems like an apropos namesake for the massive, pervasive malware that threatens PC users. The creator of ZeuS allegedly went into "retirement" last fall. Apparently, the ma...

Last updated: Mar 4, 2011   3:56 AM GMT  |  Blog: The Security Detail
How the bad guys are using Windows Update

Blog  Windows Update, a popular tool for patching computers, is now being used by the bad guys to push malware onto targeted systems. According to Symantec's Security Respose Center blog, a Trojan detected as Downloader used an "interesting technique" to download files involving a Windows component name...

Last updated: May 11, 2007   9:20 AM GMT  |  Blog: Security Bytes
Huge Spikes in Malware

Blog  According to the good folks over at Sunbelt Security (now owned by GFI), an incredible 73,000 new types of malware are being issued every day, a 26% increase over last year's figures. Between this and the recent security breach at Epsilon, I am noticing a huge increase in my own spam levels. One of ...

Last updated: May 29, 2011   1:35 PM GMT  |  Blog: Security Corner
Vista Fares Poorly on Malware Detection

Blog  Here's an interesting story from June 16 on the Website, based on recently-released research work from leading antispyware firm Webroot. It's entitled "Vista Low on Malware Detection" and makes some pretty interesting points: The OS demonstrates only limited built-in malware blocki...

Last updated: Jun 17, 2009   3:57 PM GMT  |  Blog: Windows Enterprise Desktop
Storm Worm

Blog  Malware remains a threat. The Storm Worm is one of the most threatening in recent times, and it continues to propogate. Bruce Schneier discusses it in detail here on Wired (thanks to David Lacey's blog for drawing attention to this piece). Schneier makes some remarks that should stick in all our mi...

Last updated: Oct 8, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Incident response, malware
Skywiper write up

Blog  Excellent write up on skywiper it has some pretty advanced features and it's longevity is astounding. I am sure there is more malware of this caliber still out there and undetected. With more big players coming in to the arena I am sure sure there is mor...

Last updated: May 29, 2012   3:25 AM GMT  |  Blog: Irregular Expressions
Phony Security Software Cleared from 1 Million PCs

Blog  According to Microsoft, the November release of its Malicious Software Removal Tool (MSRT) removed the phony security software, Win32/FakeSecSen, from 994,061 distinct machines in just nine days: MSRT Review on Win32/FakeSecSen Rogues. Win32/FakeSecSen is a family of programs that claim to scan for ...

Last updated: Nov 25, 2008   10:11 PM GMT  |  Blog: Security Corner
Get ready for a NanoScan

Blog  One of my favorite sayings is, "You can't beat free!" It's not always true of course, but as the industry has learned from the many useful open source tools available today, free is often good enough to avoid paying for a commercial product that does the same job. So it was in the spirit of getting...

Last updated: Apr 26, 2007   6:31 PM GMT  |  Blog: Security Bytes
Android will be targeted by malwares in 2010 : Kaspersky

Blog   Year 2009 was proved to be a great year for Android but according the Kaspersky, 2010 could be a challenging for Android just not because of a lack of awesome devices or not because Android OS wont move forward significantly,. But its the hackers who are expected to target Android users with ...

Last updated: Feb 8, 2010   4:13 AM GMT  |  Blog: Network technologies and trends
Microsoft Launches Free On-Demand Virus & Malware Scanner

Blog  Microsoft has jumped on the on-demand malware scanner bandwagon by launching a new, free virus/malware scanner that's designed to be used if you think your computer might be infected. It's called Microsoft Safety Scanner and is a portable app, so no installation is required. Here's what Microsoft h...

Last updated: Apr 22, 2011   1:17 AM GMT  |  Blog: Security Corner
Schneider USB Malware Scare

Blog  Weve talked before about security issues involved with USB drives, but heres a new one: A vendor alerting us to malware on a USB drive that its shipping with its product. Schneider Electric recently notified users of its Conext Combox and Conext Battery Monitor that USB removable media shi...

Last updated: Sep 17, 2018   1:59 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      malware, USB
Did you see this? - The Great SPAM diet results are in

Blog  See my previous post on The Great SPAM Diet. The results are now in and darkReading has the scoop. McAfee's Great Spam Experiment, Unplugged Many spam messages sent to participants in the study were phishing emails or contained malware or links to malware-ridden sites Did anyone doubt t...

Last updated: Jul 2, 2008   2:33 PM GMT  |  Blog: IT Trenches
2010: The Year of Windows 7 Malware

Blog  Yes, and no. A blog post citing statements from Swedish security software developer Lavasoft, makers of Adaware, claims that 2010 will see a shift in attacks and malware techniques to adapt to the improved security of Windows 7. The post stresses that Microsoft will continue to be the focal point o...

Last updated: Dec 19, 2009   6:17 AM GMT  |  Blog: Tech Strategy Trends
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: