Search Results | Malware
PREV 1...20   30   40...63   64   65   66   67   68   69   70   71   72...77 NEXT
Sort by:  Most Relevant  |  Date
Beware: WordPress alert

Blog  This is a guest post for the Computer Weekly Developer Network by Dennis Dwyer, Dell SecureWorks counter threat unit security analyst. WordPress is an open-source blogging platform and content management system (CMS). It is made up of more than 200,000 lines of code (written mostly in the PHP scr...

Last updated: May 31, 2013   5:53 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Cannot run Malwarebytes, HJT, SuperAntiSpyware

Answer  Cannot run Malwarebytes, HJT, SuperAntiSpyware. The icons for these on the desktop are a white box. Error message when opening "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item." DDS and GMER logs follow. . DDS (Ver_20...

Last updated: Oct 6, 2011   5:19 PM GMT   |    Antispyware, File System, HiJackThis
Inside the snake pit with angr Python framework creator

Blog  Professor Giovanni Vigna has been lauded as the worlds fourth most influential researcher in cyber security and is the founder of Lastline, a malware protection company. He is responsible for creating angr, a Python framework for analysing binaries that is used by the US Department of Defence to...

Last updated: Jan 5, 2018   1:28 PM GMT  |  Blog: Open Source Insider
ICIT: Stolen EHRs highly profitable on the deep Web

Blog  When Anndorie Cromar received a call from Child Protective Services that they were coming to take her children away, she was flabbergasted. She was unaware that her medical identity was stolen and was used by a pregnant woman to cover pregnancy costs at a nearby Utah hospital. The agency took custod...

Last updated: Sep 21, 2016   9:35 PM GMT  |  Blog: IT Compliance Advisor   |      EHR
There's no Shortage of Opportunities in Industrial Computing

Blog  Remember the Stuxnet worm? And how it infected Siemens PLCs and messed them up? I was shocked to find that most computer professionals I knew had no idea what a PLC was or what one did, let alone how to program one or secure it against malware. We tend to think of IT as a white-collar industry, and ...

Last updated: Aug 20, 2012   3:44 PM GMT  |  Blog: Climbing the IT Career Ladder
IoT security is not a check box

Blog  Everyone agrees that IoT security is important, but how do you get it right? The implications for getting IoT security wrong are well understood, especially if you operate oil pipelines or make Jeeps or medical devices. In other words, compromised internet of things devices impact brand image, custo...

Last updated: Sep 16, 2016   3:12 PM GMT  |  Blog: IoT Agenda   |      Authentication, Internet of Things, iot
Let's shed some light on the far reaches of application security

Blog  I think it's sort of human nature to be uncomfortable with the unknown and with the things that aren't under our control. That might be one of the reasons so many software quality professionals try to skate around doing security testing. Obviously there are other factors getting caught up in pre...

Last updated: Sep 13, 2013   11:42 PM GMT  |  Blog: Software Quality Insights
Chicago Schools Add CS to Core Curriculum; Others Should Do Likewise

Blog  Saw a very interesting press release from CompTIA over the weekend. Dated December 9, it's entitled "CompTIA Applauds Chicago Public Schools Plan to Make Computer Science a Core Subject." The title captures the gist of this effort nicely -- namely, that Chicago schools will start to require at least...

Last updated: Dec 16, 2013   2:32 PM GMT  |  Blog: IT Career JumpStart
How MNOs can secure the multiple layers of IoT

Blog  Security online continues to dominate the headlines. Only a few weeks ago ransomware wreaked havoc on over 230,000 computers and spread its tentacles to over 150 countries. Prior to that it was the Mirai botnet that spread fear. The list of malware goes on and on, and businesses are trying their bes...

Last updated: Jun 27, 2017   8:19 PM GMT  |  Blog: IoT Agenda   |      Authentication, Consumer IoT, Enterprise IoT
Debunking the agent vs. agentless approach to IoT security

Blog  In today's ever-changing threat environment, there is an ongoing debate about which network security approach is best for protecting IoT environments -- agent or agentless. Each technique impacts the efficiency of IT operations and overall network security compliance differently, however, when it co...

Last updated: Oct 18, 2017   3:30 PM GMT  |  Blog: IoT Agenda   |      agent, Agentless, cybersecurity
Looking Forward to 2015: Security, Security, Security

Blog  This is a short post, because it is the one that says good-bye to 2014 and hello to 2015. I am not a big fan of year-end posts, but all my journalist buds are doing them so I might as well do one, too. And the three main things I see happening to us in 2015 are security breaches, security breaches, ...

Last updated: Jan 1, 2015   0:46 AM GMT  |  Blog: Cheap Computing   |      Hackers, Security, Sony
Service Pack 2 set to XPire: Here's what's next for Windows

Blog  Don't worry, this isn't another Y2K-ish post about the end of Windows XP supportand civilizationas we know it. More like a friendly community reminder: Next week, July 13th, marks the end of support for Windows XP Service Pack 2. Your computer will most likely not explode into millions of tiny...

Last updated: Jul 7, 2010   9:22 PM GMT  |  Blog: Enterprise IT Watch Blog
Interesting Win7 Issues with Spyware Doctor with Antivirus

Blog  I'm a long-time fan of PC Tool's highly-regarded Spyware Doctor antispyware products, and have run at least one version of this product family on a like number of test and production machines for going on four years now. In the last month, I've had problems with their latest and greatest combined an...

Last updated: Nov 16, 2009   5:13 PM GMT  |  Blog: Windows Enterprise Desktop
Western Digitals My Cloud NAS security under fire

Blog  Western Digital released a firmware update last year to address critical backdoor security vulnerabilities in its My Cloud NAS products but the company this week acknowledged more security issues with the devices still need to be addressed with firmware updates. Western Digital addressed the My Clo...

Last updated: Jan 10, 2018   10:55 PM GMT  |  Blog: Storage Soup   |      Storage
Channel news: Google offers storage; Wipro nails Boeing services deal

Blog  Google rolls out paid storage services Web search and Internet services company Google Inc. on Friday began selling expanded online storage, aimed at users with large picture, music or video file collections. Wipro in talks for Boeing IT svcs contract: official India's third-largest software servic...

Last updated: Aug 13, 2007   11:51 AM GMT  |  Blog: Channel Marker
IT Knowledge Exchange Community Update for 02/03/09

Blog  Here is what's happening in our community lately: Win a t-shirt from IT Knowledge Exchange Featured member of the week Featured questions Featured blog posts New community blogs Messages from the TechTarget network Win a T-Shirt from IT Knowledge Exchange IT Knowledge Exchange is currentl...

Last updated: Feb 3, 2009   3:14 PM GMT  |  Blog: ITKE Community Blog
Information Security Industry or e-Protection Racket?

Blog   What other industry would collectively spend over 3 billion a year on protection and less than 30 million a year on tracking, tracing and removing the predators who are milking them? Come to InfoSec (Tuesday to Thursday) and see how and why the security of the on-line world is in such a parlous...

Last updated: Apr 25, 2009   11:52 AM GMT  |  Blog: When IT Meets Politics   |      Cybercrime, Eurim, Infosec
IoT device breaches: Consumers can help, but onus is on device vendors

Blog  IoT device manufacturers have by and large flooded the market with web-connected products that have little or no security measures to speak of. There remains such a focus on usability, features and time-to-market (especially with the more ubiquitous lower-end devices) that there's a real threat to t...

Last updated: Jun 4, 2018   7:58 PM GMT  |  Blog: IoT Agenda   |      ARM, Consumer IoT, DDOS
Time to welcome CCIE Security Version 5 Written and Lab exam

Blog  Starting today i.e. 31st Jan 2017 , CCCIE Security Version 5 exams both lab and written are available for all CCIE aspirers all over the globe in authorised centres. The written exam known as CCIE Security Written Exam (400-251) version 5.0 is a two-hour test with 90-110 questions. However the CCI...

Last updated: Jan 31, 2017   5:23 AM GMT  |  Blog: Network technologies and trends   |      ASA, CCIE, Cisco
Risk assessment and the Nu M8 Child Tracker

Blog  A few weeks ago I allowed my 7 year old daughter to walk the last 400 yards from the bottom of the road to the school gate by herself. Off she trotted, full of her own independence, and away she went. About half an hour later the school headmistress called me "did you know that your daughter arrived...

Last updated: Jan 7, 2009   9:30 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Misc, Network security, Security management
PREV 1...20   30   40...63   64   65   66   67   68   69   70   71   72...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: