Search Results | Malware
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Ten Web Browsing Myths - Part 1

Blog  Sophos recently issued a whitepaper called "The 10 Myths of Safe Web Browsing." It covers everything I have been saying to my clients all along. The problem with security is often one of complacency (see Why People Are Complacent About Security); no visible infections or problems are manifest, so a...

Last updated: Aug 28, 2010   2:48 AM GMT  |  Blog: Security Corner
Let's not go overboard about Flame malware

Blog  Similar to nuclear war scenarios, the most significant damage the recently discovered Flame malware will inflict comes from its fallout rather than from the initial blast. The seriousness of Flame is real: Flame and the Duqu and Stuxnet malware are capable of attacking national critical infrastruct...

Last updated: Jun 5, 2012   3:13 PM GMT  |  Blog: CIO Symmetry
air gapping

Blog  Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued Quote of the Day "One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gap...

Last updated: Sep 8, 2017   8:45 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Faraday, malware, security awareness
Panda Cloud Antivirus Emerges From Beta

Blog  [caption id="attachment_425" align="alignleft" width="416" caption="Panda Cloud Antivirus UI"][/caption] I reported on Panda Cloud Antivirus back in June and July in my posts, Pandas Cloud Antivirus (Beta) is a Winner! and Pandas CloudAntivirus Update. I tested Panda Cloud Antivirus extensiv...

Last updated: Nov 10, 2009   2:25 PM GMT  |  Blog: Security Corner
Cure for Malware Antivirus 2009

Answer  Anybody know a cure for malware Antivirus 2009?

Last updated: Nov 14, 2008   6:45 PM GMT   |    Antivirus, malware
Google launches Safe Browsing API

Blog  Google has launched a new tool for downloading its list of suspected phishing and malware URLs -- the Safe Browsing API. The Google blog hails it as "a simple mechanism for downloading Google's lists of suspected phishing and malware URLs, so now any developer can access the blacklists used in prod...

Last updated: Jun 19, 2007   11:55 AM GMT  |  Blog: Security Bytes
Sophos video ties malware to Google Earth, Britney Spears

Blog  Some security researchers at malware protection vendor Sophos have created a video that really gives people a visual of how complicated Web-based attacks can be. No, theyre not exploiting erotic pictures of the troubled pop star. It shows spam pushing pictures of Britney Spears to a tangled web o...

Last updated: Jun 4, 2008   12:17 AM GMT  |  Blog: Security Bytes
Sophos Security Threat Report 2014 released

Blog  From Sophos (full Press Release here): Cybercriminals are smarter, and malware is stealthier and more dangerous than ever before. We currently see more than 250,000 unique samples of malware every day. The bad guys are constantly moving. Can you keep up? Our Security Threat Report 2014 explains how...

Last updated: Jan 26, 2014   5:30 PM GMT  |  Blog: Security Corner
AV industry sucks

Blog  So says the CEO of Trend Micro, Eva Chen, in this new interview where she describes how a cloud-client architecture is the solution to stop malware. It's good to finally see one of the large anti-malware vendors sticking its neck out and trying to address the problem at source.  ...

Last updated: Jun 22, 2008   7:46 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      malware, Network security
Malware: Insertion and Types

Blog  In continuing our awareness for cyber-crime, recognize that after an entity penetrates a network for access, far more than an episodic outcome can occur (such as a one-time theft of data or money, for example). Beyond the sole-harming event type of experience, the insertion and ongoing residency of...

Last updated: Jan 15, 2013   9:25 PM GMT  |  Blog: The Business-Technology Weave
Malware in Google attacks uses spaghetti code

Blog  Coding technique designed to tie up reverse engineers has been used in the past, Symantec says. Researchers reverse engineering the malware used in a string of attacks against Google and at least 30 other firms and government agencies, has found the cybercriminals behind the attack using spaghetti ...

Last updated: Jan 26, 2010   2:16 PM GMT  |  Blog: Security Bytes
The problem with mischief

Blog  This is an issue I have with casual and even malicious malware, in the majority of cases the goal of this software is to steal money or identities. But when this software gets onto a network that does something that lives depend on, it's a pretty big deal. http://www.techworld.com.au/article/376509...

Last updated: Feb 14, 2011   5:02 PM GMT  |  Blog: Irregular Expressions
Android malware delivery is harder than you might think

Blog  There is certainly no shortage of infosec headlines mentioning some new Android malware threat. There are banking Trojans, malware that can root your phone, monitor your communication or steal your data. Given the frequency and bombast of the headlines, you might even think that Android is completel...

Last updated: Oct 26, 2016   8:39 PM GMT  |  Blog: Security Bytes   |      Android, malware
New Trojan masquerades as Adobe update

Blog  If victims are tricked, the Trojan downloads other malicious files designed to enable attackers to remotely steal data. TrendLabs engineers have discovered a new trick that uses a phony Adobe update to install a Trojan on victims machines. An unsuspecting victim can fall prey to the trick by vi...

Last updated: Apr 7, 2010   1:03 PM GMT  |  Blog: Security Bytes
Microsoft releases temporary fix for critical Windows bug

Blog   Microsoft has issued a temporary fix for a critical Windows vulnerability that has already been exploited to install highly sophisticated malware that targeted manufacturers of industrial systems. In an advisory issued late Thursday, Microsoft said the previously unknown flaw in the Win32k TrueTy...

Last updated: Nov 4, 2011   4:19 PM GMT  |  Blog: Security Corner
Would you click if it showed on the NY Times website? - Really would you?

Blog  Yesterday Fierce CIO reported that New York Times falls victim to rogue ad. This is a trend that seems to be happening more frequently. Rogue malware ads are appearing in a lot of places these days in areas most people would trust as authoritative and reliable sources of information. It is unknown h...

Last updated: Sep 16, 2009   6:31 PM GMT  |  Blog: IT Trenches
Bootkit - rootkit - malware bypasses disk encryption!

Blog  If you have not been nervous before about someone infecting computers without your knowledge then you should be much more nervous after reading this article. In 1987 the Stoned boot sector virus came out and was one of the most prevalent viruses of the early personal computer era. As with most malw...

Last updated: Aug 14, 2009   12:48 AM GMT  |  Blog: IT Trenches
command and control server

Blog  A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. Continued Quote of the Day "To protect their malicious operations, hackers are constantly looking for techniq...

Last updated: May 4, 2018   6:24 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Shell Vulnerability Patch Brings Minor Trouble in its Wake

Blog  In a couple of recent blogs, I've been reporting about a particularly nasty strain of malware based on a Windows Shell Vulnerability that affects all desktop versions of Windows from 2000 through 7, and all Server versions from 2000 to 2008 R2: 7/29/2010: Vulnerability in Windows Shell could allow...

Last updated: Aug 4, 2010   2:48 PM GMT  |  Blog: Windows Enterprise Desktop
Malware Types: Nuisance malware

Blog  Not all malware produces instances of horrendous harm. Some of it is simply a nuisance, in delivering unwanted content and add-ons such as toolbars, or unwanted and even embarrassing content in the real estate dedicated to rotating ads on certain sites. Spyware can rake a system for sen...

Last updated: Jan 18, 2013   2:19 AM GMT  |  Blog: The Business-Technology Weave
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: