Search Results | Malware
PREV 1...2   3   4   5   6   7   8   9   10   11...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
The Equation Group malware mystery: Kaspersky offers an explanation

Blog  The ongoing drama between Kaspersky Lab and the U.S. government received some much-needed sunlight last week as the antivirus vendor finally uttered two very important words: Equation Group. Kaspersky issued a statement describing how it came to possess Equation Group malware, which was a response ...

Last updated: Nov 1, 2017   0:55 AM GMT  |  Blog: Security Bytes
Researcher unveils BotHunter

Blog  At the Usenix Security Symposium in Boston Thursday morning, researcher Guofei Gu from the Georgia Institute of Technology unveiled a new application IT security pros can use to blunt the threat of bot infections. BotHunter is outlined in a paper Gu wrote with fellow Georgia Tech researcher Wenke L...

Last updated: Aug 9, 2007   2:17 PM GMT  |  Blog: Security Bytes
DNSChanger malware problems unlikely

Blog  DNSChanger infections have declined precipitously, but remaining systems could have Internet access turned off today. It appears the Internet will not be thrown into turmoil as a result of the FBI shutting down the servers feeding systems containing DNSChanger malware. The DNS Working Group, made ...

Last updated: Jul 9, 2012   1:20 PM GMT  |  Blog: Security Bytes
Why web security is best served in the cloud

Blog   Most business today is conducted electronically, with the internet a prime communications mechanism and resource for finding and sharing information. Yet its importance makes it a prime vector of attack for hackers that are looking to steal information for commercial gain. Because of this, malware ...

Last updated: Feb 17, 2010   3:12 PM GMT  |  Blog: Bloor Security   |      Cloud Computing, SaaS, Web security
Surveillance tools beat hidden malware at its own game

Blog  Just as surveillance tools have flourished in the physical world because they can monitor systems in hiding think nanny cam such seemingly invisible monitoring systems have flourished in the digital domain. Rootkits, a form of malware designed to take control of a system without the authori...

Last updated: Aug 14, 2008   1:53 PM GMT  |  Blog: Enterprise Linux Log
Oscarbot.UG Eludes Detection with Intelligent Stealth

Blog  According to Panda Security, the Oscarbot.UG virus, first detected on August 17, 2008, uses intelligent stealth techniques to avoid detection. "It deletes the original file from which it was run once it is installed on the computer. It uses several methods in order to avoid detection by antivirus ...

Last updated: Aug 23, 2008   2:39 AM GMT  |  Blog: Security Corner
Mozilla Missed Malware in Infected Firefox Add-ons

Blog  Two Firefox add-ons located in the experimental section of Mozilla's official add-on download site were recently discovered to contain trojans. Despite the ability of commercial anti-virus Products to detect the trojans since 2008, The Register reported that "...a scanning tool used by Mozilla to ve...

Last updated: Feb 7, 2010   4:14 PM GMT  |  Blog: Security Corner
TechTarget's weekly roundup (8/13 - 8/20)

Blog   Code image via FreeImages Have you seen trends in the type of malware or attacks being attempted on your organization? Check out what one expert has noticed in malware/ransomware code in this week's roundup. 1. Amanda Rousseau talks about computer forensics investigations - Michael Heller (SearchS...

Last updated: Aug 20, 2018   2:26 PM GMT  |  Blog: Enterprise IT Watch Blog   |      CIO, IBM, Quantum
Pen testing through the mail -- attack not real but the malware is

Blog  Someone's been mailing letters purporting to be from the National Credit Union Administration to credit unions throughout the U.S. The letters ask the recipients to view training material on enclosed CDs. Not too surprisingly, the unexpected letters turned out to be fake and the CDs loaded with mal...

Last updated: Sep 2, 2009   2:10 PM GMT  |  Blog: Our Latest Discovery
Google search results serve up malware - I've had the crime of my life

Blog  Well, that may not be news to you. However, there is a recent trend in malware propagation that uses Google as the portal to deliver payloads to visitors. Unsuspecting users go to Google and search for topics such as Patrick Swayze's death or the controversy about Serena Williams cursing at the line...

Last updated: Sep 16, 2009   6:41 PM GMT  |  Blog: IT Trenches
Facetime Adds Sophos AV Protection to Unified Security Gateway

Blog  Facetime is a respected name in unified communications security. Its Unified Security Gateway, or USG 3.0, appliance allows enterprise administrators to control the web sites and applications that can be accessed by users, as well as monitoring and filtering content for Web 2.0 communications such a...

Last updated: Oct 30, 2009   12:32 AM GMT  |  Blog: Unified Communications: Click to talk
FaceTime Strengthens UC / Web 2.0 Security with Sunbelt Partnership

Blog  FaceTime is building more comprehensive security into its Unified Security Gateway thanks to a partnership with Sunbelt Software. According to the press release, "Sunbelt's anti-malware technology, designed specifically for the gateway, and its Threat Track(TM) data feeds have been licensed by Face...

Last updated: Sep 5, 2009   3:03 AM GMT  |  Blog: Unified Communications: Click to talk
Changing Threats Require Better User Security Awareness

Blog  The importance of anticipating - or at the very least keeping abreast of - emerging threats is illustrated by a report by Carole Theriault, a senior security consultant with Sophos, highlighting a huge increase in the number of malicious Web sites. She points out that the number has risen from 5,000...

Last updated: Jul 3, 2007   4:12 PM GMT  |  Blog: David Laceys IT Security Blog   |      People, threats
Secure USBs Used to Hack Airgapped PCs

Blog  A fairly common theme here has been Dont poke strange USB sticks in things, because its a common vector for transmitting malware (and reprogramming your keyboard, and setting your PC on fire). Heres a new take on that. Its pretty esoteric but now that the technique is out there, it...

Last updated: Jun 30, 2018   1:41 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      Security, USB
Black Hat 2010: Greg Hoglund on malware attribution and fingerprinting

Blog  Greg Hoglund, founder of HB Gary Inc., presented his work on malware attribution and fingerprinting today at Black Hat in Las Vegas. In this interview, Hoglund talks about his research into looking at how to best trace malware to its author by looking at toolmarks left by the hacker within code. By ...

Last updated: Jul 28, 2010   9:28 PM GMT  |  Blog: Security Wire Weekly
McAfee discovers 10,000 malware-laced sites

Blog  McAfee is ringing the alarm bell over its discovery Wednesday of some 10,000 Web pages attackers have rigged with PC-hijacking malware. The security vendor says it's one of the largest attacks to date of this kind. Here's what a company spokesman told me by email: "The Web pages have all been modi...

Last updated: Mar 13, 2008   9:06 AM GMT  |  Blog: Security Bytes
[TLBAT] Anti-malware tools

Blog  Hello folks, continuing on the path to save our low budget a matter that has to be faced is the detection and removal of virus, malware and spyware. I normally tend to use professional tools for these delicate matters because of several considerations: when you BUY software you also have support, a...

Last updated: Jul 9, 2008   5:03 AM GMT  |  Blog: If it has a plug, it's IT stuff
How to stay (relatively) secure with XP at the end of support Part 2

Blog  In How to stay (relatively) secure with XP at the end of support Part 1, I recommended that you ditch IE 8 for Chrome or Firefox for web surfing and promised to provide even more advice. In this post, I give you several more ways to operate with Windows XP in a relatively safe manner after the e...

Last updated: Jan 20, 2014   8:53 PM GMT  |  Blog: Security Corner
Recipe for malware infection - 10 steps

Blog  For certain malware infection follow these steps: 1. Do not apply operating system patches. 2. Do not apply application patches. 3. Do open emails from unknown sources. 4. Do open attachments on emails from unknown sources. 5. Do open unexpected attachments appearing to be from known sources. "...

Last updated: Jan 15, 2010   7:33 PM GMT  |  Blog: IT Trenches
Is Your PC Infected With Malware?

Blog  I am always suspicious when my computer starts acting strangely and immediately do a scan for malware. I usually come up clean, discovering that the strangeness is some sort of software error or system glitch. The last time I noticed a computer acting strangely (not my own), it turned out to be a ma...

Last updated: Aug 14, 2011   8:51 PM GMT  |  Blog: Security Corner
PREV 1...2   3   4   5   6   7   8   9   10   11...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: