Search Results | Malware
PREV 1...30   40   50...65   66   67   68   69   70   71   72   73   74...77 NEXT
Sort by:  Most Relevant  |  Date
Malware /Browser Hijacker: It happened to me and a cure

Blog  Has It Happened to You? Having your browser hijacked, with constant resetting of your homepage, and nagging popups and ads, is a real drag. Just ask me. Ever taken an old laptop off the shelf and turned it into (primarily) a Pandora radio station? Lemme tell ya its a chore. I got aroun...

Last updated: Apr 25, 2013   1:33 PM GMT  |  Blog: The Business-Technology Weave
Say! You CAN use Gadgets in Windows 8: 8GadgetPack to the Rescue

Blog   Thanks to old friend, occasional co-author, and MS Security MVP Deb Shinder, I'm now aware of a snazzy little utility named 8GadgetPack that restores those ever-so-handy-and-informative desktop gadgets to Windows 8. For those who don't recall, gadgets were stripped out of Windows just over a year ...

Last updated: Nov 11, 2013   3:25 PM GMT  |  Blog: Windows Enterprise Desktop
NSA mobile security plan could be roadmap for all mobile device security

Blog   Security research firm Securosis has started a series of blog posts about how to protect enterprise data on Apple iOS smartphones. Securosis' Rich Mogull explains that companies are increasingly feeling pressure from employees to support iOS. But how does the IT security team ensure the protectio...

Last updated: Mar 15, 2012   6:16 PM GMT  |  Blog: Security Bytes
Win10: A Half-Month of Streaming Updates

Blog  In the brave new world of Windows 10, updates are no longer batched, but pop up when and as they appear. I decided to take a look at what that means by examining the Update Histories for my two current Windows 10 PCs, in terms of types and frequencies of updates involved. But first, of course, some ...

Last updated: May 15, 2015   1:25 PM GMT  |  Blog: Windows Enterprise Desktop   |      Microsoft Patch Tuesday, Windows 10
Touchscreen All-in-One Poses Interesting Win8 Possibilities

Blog  Earlier this week I stumbled across a January PC Magazine story entitled "Build a Touch-Screen All-in-One Desktop." The star of the story is from EliteGroup (a Taiwanese mega-manufacturer of PCs and parts) known as the G11, a bare-bones compact PC with an integrated 21.5" touchscreen and lots of oth...

Last updated: May 11, 2012   4:21 PM GMT  |  Blog: Windows Enterprise Desktop
Channel news: IE7 download is spam; Calif. wastes $1.4B onIT; Symantec Backup Vista-rified

Blog  Spam poses as Internet Explorer 7 download Beware of emails from "admin@microsoft.com." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware. [SearchSecurity.com] California's $1.4bn IT boondoggle More dollars than sense. [TheReg]...

Last updated: Apr 2, 2007   11:28 AM GMT  |  Blog: Channel Marker
Password-related Definitions

Blog  The National Institute of Standards and Technology (NIST) issued a draft of Special Publication 800-118 entitled "Guide to Enterprise Password Management" that I have been using to help our corporate IT folks formulate standard password policy. The guide is a comprehensive look at the subject and I ...

Last updated: Sep 11, 2011   2:28 PM GMT  |  Blog: Security Corner
VMware MVP: A good idea, but

Blog  VMware highlighted its Mobile Virtualization Platform at VMworld 2011, but I left the show feeling like the technology is little more than a novelty. The concept itself is a good one, but the lack of Apple iOS support, VMwares reliance on Googles fragmented hardware partners and concerns abou...

Last updated: Sep 7, 2011   2:13 PM GMT  |  Blog: The Virtualization Room
Securing industrial IoT: Spotlight on DMZ and segmentation

Blog  Industrial IoT is ushering the era of IT and OT convergence. However, making traditional OT assets smarter with IT technologies also means a larger cyber threat surface and, hence, more exposure to cyberattacks which are growing smarter as well. Unlike in IT, a breach in OT security means not just ...

Last updated: Sep 29, 2016   4:29 PM GMT  |  Blog: IoT Agenda   |      DMZ, IIoT, Internet of Things
Security Forecasts for 2007

Blog  Its getting to that time of the Season when many of us look ahead to a New Year with mixed emotions of hope, fear, uncertainty or just plain boredom. What will 2007 bring? Will it be more of same? Will it herald a new age of prosperity or danger? Heres my Top 10 Security Trends of the coming ...

Last updated: Dec 29, 2006   11:26 AM GMT  |  Blog: David Laceys IT Security Blog   |      Predictions, Professionalism, Technology
8 steps for implementing a successful print security plan

Blog  Amidst the proliferation of Internet of Things (IoT) endpoints, the cybersecurity threat landscape has expanded to every mobile, smart and cloud-enabled device on the network. This threatens the resilience of organisations not only from the disruption of business operations, but also the potential r...

Last updated: Jan 27, 2017   8:40 AM GMT  |  Blog: Quocirca Insights
Will verified domain names transform UK competitiveness as a location for online business?

Blog   The importance of the Nominet consultation  on their proposed new direct.uk service cannot be under-estimated. The EU Regulation on electronic IDs may be the first political/regulatory initiative to view a domain name as an electronic identity which requires some form of verification. It ...

Last updated: Oct 17, 2012   6:10 PM GMT  |  Blog: When IT Meets Politics   |      CANN, Domain name, London
Are you protecting your SMB customers? Securing the internet of things

Blog  Much of the national conversation about the internet of things has centered around connected consumer devices such as watches, cars and thermostats. Businesses don't think about the cybersecurity settings of their photocopiers, yet 2016's Mirai malware used hundreds of thousands of IoT devices to cr...

Last updated: Jan 26, 2017   9:06 PM GMT  |  Blog: IoT Agenda   |      Enterprise IoT, Internet of Things, iot
Can you block a website? Or are there better ways of addressing undesirable content?

Blog   Over the past year we have seen mounting calls for Internet Traffic to be filtered in order to improve cybersecurity, protect intellectual property, tackle terrorism or ensure children are not exposed to adult content.  The success of the Internet Watch Foundation is used to support calls for ...

Last updated: Feb 29, 2012   8:24 PM GMT  |  Blog: When IT Meets Politics   |      cybersecurity, deep packet inspection, Eurim
Risk Assessment Process

Blog  Somebody asked me if I'd put a bit more detail around some of the high level topics I cover in this blog. So I thought I'd talk a bit about the risk assessment processes that I follow. There are a variety of ways of assessing risk. Most basic is an assessment made based on our own thoughts and opin...

Last updated: Feb 8, 2007   7:30 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Risk assessment
User Behavior Analytics (UBA) & Ransomware Analytics

Blog  User Behavior Analytics (UBA) enables organizations to identify suspicious activity based on how a user interfaces with systems and the environment. Their typing style, most used commands, morning routine, the applications they use, the rate at which they work and many other facets can be analyzed...

Last updated: May 18, 2016   4:57 PM GMT  |  Blog: Virtual CISO   |      Ransomware, Threat detection, Threat intelligence
DH2is New DxOdyssey to Ensure Security for Remote User Access

Blog  DH2is New DxOdyssey, Software-Defined Perimeter (SDP) Software, Promises to Ensure Security for Remote User Access to Cloud Services An Alternative to VPNs, Which Present Management Headaches and Security Vulnerabilities From the IT department to the C-suite, data security has become a key prio...

Last updated: Feb 15, 2019   6:10 PM GMT  |  Blog: Quality Assurance and Project Management   |      Data-security, DH2i
Hybrid Cloud Services for VMware: All About IO Filters @JetStreamSoft V

Blog  This is the fifth and the last post of Q&A with Serge Shats, Ph.D., CTO and Co-Founder, JetStream Software. Previous four posts links are here: Post 1 Post 2 Post 3 Post 4 Q: How are IO filters used for cloud DR? A: Here are four scenarios in which IO filters can be used to replicate data for ...

Last updated: Dec 20, 2018   4:14 PM GMT  |  Blog: Quality Assurance and Project Management   |      Business Continuity, Data Replication, Hybrid cloud
Fixing Win10 Restart PC to Finish Installing Drivers Issue

Blog  I've chased down a strange sequence of clues over the past few days to finally resolve an odd device driver issue. The reason I say the device driver issue is odd stems from its origin. It followed in the wake of a recent Security Update for the Adobe Flash Player. "I don't see that a device was inv...

Last updated: Jun 11, 2018   4:35 PM GMT  |  Blog: Windows Enterprise Desktop   |      Device drivers, Troubleshooting, Windows 10
Remote access technology used for hacking

Answer  I have 4 Laptops and every one has been hacked by Remote Access Technology. I reformatted my HD at least 60 times b4 I found out the technique that was being used. I did a Google search on: "How to hack a PC that is not connected to the Internet" I found out that the hackers were using the RAT metho...

Last updated: Jan 11, 2016   2:11 PM GMT   |    Hacking, Remote access, Security
PREV 1...30   40   50...65   66   67   68   69   70   71   72   73   74...77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: