Search Results | Malware
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
TechTarget's weekly roundup (9/18 - 9/25)

Blog   Security image via FreeImages For close to one month, CCleaner malware was spread to users via an infected software update. Check out the total impact of the malware in this week's roundup. 1. CCleaner malware spread via supply chain attack - Michael Heller (SearchSecurity) CCleaner malware was s...

Last updated: Sep 25, 2017   12:51 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Android, Flash, Mainframe
Storm worm is not so bad after all

Blog  For any of you who are nostalgic for the halcyon days of 2001 and 2002 when network-aware worms such as Code Red, Slammer and Nimda ruled the headlines, the success of the Storm worm in the last year must bring back some fond memories. Or not. But at the very least it has shown us that the malware w...

Last updated: Sep 21, 2007   3:16 PM GMT  |  Blog: Security Bytes
What are the best Android mobile security apps?

Blog  Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and antimalware software. The firm tested the detection capabilities of a variety of available Android mobile secur...

Last updated: Mar 6, 2012   9:01 PM GMT  |  Blog: Security Bytes
Malware in MP3 players

Blog  Following on from the story about dodgy Cisco hardware, it seems that some of our popular consumer electronic gadgets such as MP3 players and digital picture frames are infected with malware before they even leave the factory. A number of online news sources are running the same story as reported h...

Last updated: Mar 16, 2008   3:25 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware, Network security
Anti-virus alone is a poor strategy

Blog   Computer viruses and other malware such as worms, trojans and spyware, are rife and can cause tremendous damage to systems that become infected. Because of this, anti-virus (AV) technology is one of the most commonly deployed security controls used by the vast majority of computer users, from indiv...

Last updated: Nov 22, 2010   3:05 PM GMT  |  Blog: Bloor Security   |      Anti-virus, malware, Security
Can malware/spyware manipulate the time stamp on previously searched history?

Answer  Hi I am having a problem with malware on my laptop. Is it possible that malware can change the date of previously researched history? Recently, I have seen websites that I visited last year pop in my history with a different time stamp. I also formatted my HDD a few months ago, is it possible that ...

Last updated: Aug 15, 2016   2:25 PM GMT   |    malware, Security, Spyware
Next certification

Blog  I am currently undecided on the next course I am going to be taking. I would really like to take the Reverse-Engineering Malware: Malware Analysis Tools and Techniques FOR610 this is an area I would like to improve on. The other choice is the Computer Forensic Investigations - Windows In-Depth FOR...

Last updated: Dec 31, 2011   2:56 AM GMT  |  Blog: Irregular Expressions
RSA adds malware domain feeds to CyberCrime Intelligence Service

Blog  List of malware domains can be fed into IPS and IDS appliances to disrupt communication between malware and an attackers command and control server. RSA is bolstering its CyberCrime Intelligence Service, adding malicious domain blacklists as a new feature for organizations that use the service....

Last updated: Aug 17, 2011   2:49 PM GMT  |  Blog: Security Bytes
What the heck is a password honeypot?

Blog  Has your Gmail, Yahoo, Hotmail or Skype account ever been hacked? If so, you either have an extremely guessable password, or you gave hackers your login credentials by putting them into a password honeypot. What the heck is a password honeypot? Good question. Let me give you a bit of background. Th...

Last updated: Jan 17, 2012   10:57 AM GMT  |  Blog: Security Corner
Did you see this? - a live honeynet

Blog   I just came across the Shadowserver Foundation. According to their mission: The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and report on malware, botnet activity, and electronic fraud. It is the mission of the Shadowserver Foundation ...

Last updated: May 9, 2008   6:20 PM GMT  |  Blog: IT Trenches
Mozilla Alert About Sothink Was False Positive

Blog  Better a false positive than no warning at all, I say. And the one real alert was confirmed. Here's the scoop as reported by Mozilla in their blog: Last week, we disclosed two instances of suspected malware in experimental add-ons on AMO. Since that disclosure, weve worked with security experts...

Last updated: Feb 17, 2010   3:28 AM GMT  |  Blog: Security Corner
Infosec Steering Committee

Blog  It was my privilege to be invited to chair this years Infosec Europe Steering Committee meeting yesterday. The event team presented lots of plans and ideas that suggest next years show will be the best yet. What surprised me was the range of key information security related issues identified by the...

Last updated: Nov 7, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart
Overheard: Using government Trojans to catch terrorists

Blog   The German Pirate Party just published some internal documents that show how Bavarian crime fighters want to get around Skype's VOIP encryption: The plan is to trick suspects into installing trojan-like malware on their PCs that then captures Skype phone calls and forwards them to a remote serve...

Last updated: Jan 28, 2008   4:17 PM GMT  |  Blog: Word of the Day: Tech Definitions from
IRS a little lazy on scanning servers for malware

Blog  A recent report by the Treasury Inspector General for Tax Administration (TIGTA) noted that the IRS scans about 89% of it's servers weekly for malware and viruses. That should give you a warm and fuzzy feeling. Apparently they believe that employee workstations pose more of a threat. All employee...

Last updated: Mar 18, 2009   11:35 PM GMT  |  Blog: Open Source Software and Linux
My Top Five Security Tools

Blog  Over the years, I've accumulated hundreds of tools and utilities that I use to help others--and myself--stay secure on the Web. In fact, I've compiled these into my Geek Toolkit which I've made available to everyone on my website. Several of these tools stand out as evergreen utilities in the ever-c...

Last updated: Jun 30, 2010   8:27 PM GMT  |  Blog: Security Corner
Microsoft Releases Out-of-Band Security Bulletin MS08-067

Blog  Microsoft just released a critical update for a "privately reported" vulnerability in the server service: This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC...

Last updated: Oct 23, 2008   8:29 PM GMT  |  Blog: Security Corner
network behavior anomaly detection

Blog  Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or trends. Continued Quote of the Day "It's essential that you extend your security controls beyond the perimeter, adding network anomaly detection capabilities to your other existi...

Last updated: Nov 10, 2016   9:21 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Security
Studying Google and Twitter for Malware

Blog  The folks from Barracuda Labs have issued a midyear report with some riveting data about the connection between Twitter and Google as venues for malware. You can see the summary and download the report here. It was fascinating reading their assessment of search engine malware as well as Twitter use...

Last updated: Aug 3, 2010   4:54 PM GMT  |  Blog: Sister CISA CISSP
Patch Tuesday update blocks dangerous Trojan

Blog  The update to the Microsoft Malicious Software Removal Tool (MSRT) includes the removal of FakeSysdef, a pesky Trojan that poses as a system performance tool. Microsoft has bolstered its Malicious Software Removal Tool this month to include a signature that detects and removes FakeSysdef, a Trojan ...

Last updated: Aug 10, 2011   2:25 PM GMT  |  Blog: Security Bytes
Microsoft Standalone System Sweeper Beta

Blog  One of the problems with malware is that it is often difficult to remove while the system is running. Last week, I dealt with a particularly sticky infection that I couldn't remove until I used a boot CD. In the case of rootkits, their very nature is to hide from the system, so you often don't even ...

Last updated: Jun 3, 2011   11:59 PM GMT  |  Blog: Security Corner
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: