Search Results | Malware
PREV 1...30   40   50...67   68   69   70   71   72   73   74   75   76 NEXT
Sort by:  Most Relevant  |  Date
Bogus funeral announcement points to malware

Blog  [caption id="attachment_1227" align="alignleft" width="285"] Source: FortBendNow.com[/caption] One of the latest tricks in the cyber-criminals' bags is an email with the subject (it varies), "Death and Funeral Announcement." Now, what normal person would see that and NOT open it? I know I did. What...

Last updated: Jan 26, 2014   4:57 PM GMT  |  Blog: Security Corner
Japan Quake Spam Links to Malware

Blog  Surprised? You shouldn't be. This type of thing seems to happen every time there is a major disaster anywhere in the World. We saw it with Katrina, the Indonesian tsunami, and countless others. The slime-bag criminals have no scruples and will take any opportunity to steal a buck from unsuspecting...

Last updated: Mar 23, 2011   0:10 AM GMT  |  Blog: Security Corner
Do I have malware on my system?

Answer  I have been told that if you cannot see your start-up item in the system configuration utility window under the start-up tab, that's an indication that you have spyware. Is there any true to this?

Last updated: Mar 4, 2008   5:53 PM GMT   |    malware, Windows Security, Windows tools/WSRM
Preparing for future security threats, evolving malware

Blog   Security expert Nick Lewis predicts how infosec threats will evolve in 2010. Luckily, enterprise defenses will evolve, too.

Last updated: Jan 21, 2010   2:33 PM GMT  |  Blog: Security Wire Weekly
If One Free Malware Removal Program Costs $0.00, How Much do Three Malware Removal Programs Cost?

Blog  Oh, oh, oh. A friend's computer isn't working right. Could it be a virus? Or just as likely, a worm, which many people would call a virus even if it isn't one? The traditional troubleshooting technique here is, "When in danger or in doubt, run in circles, scream and shout." But we're smarter than th...

Last updated: Jun 7, 2013   4:25 PM GMT  |  Blog: Cheap Computing
Malware removal software vs hard drive sanitation software

Answer  My computer has slowed to a snails pace. Suspecting spyware or a virus I tried downloading free removal software from the internet such as AVG, Noadware, etc. Some were bait and switch offering scans but charged for removal. Usable free removal software had not effect and did not work. Would sanita...

Last updated: Aug 1, 2008   2:26 PM GMT   |    malware, Spyware, Viruses
Malware turned system restore off through group policy

Answer  system restore turned off thru grouppolicy... help spy ware bug and cant remove antimalware doctor

Last updated: Oct 22, 2010   3:23 AM GMT   |    Antispyware, Group Policy, malware
One-Third of Pirated Windows 7 Contains Malware

Blog  Microsoft has developed an update for Windows 7 designed to detect more than 70 known activation exploits and attempt to identify counterfeit copies of Windows 7. Obviously, users who knowingly use pirated versions of Windows 7 will not apply the optional update, but what about those who think thei...

Last updated: Feb 15, 2010   3:19 AM GMT  |  Blog: Tech Strategy Trends
SVCHOST.EXE is malware which infects the registry

Answer  How do I delete this registry infection? The problem appears under the name 'INTERACTIVE SERVICES DIALOG DETECTION' and prevents printer function (in my case). I have tried using MS Config to eliminate unknown downloads but that didn't work . Have tried several registry 'cleaners' without success.

Last updated: Mar 26, 2013   4:08 PM GMT   |    malware, Microsoft Windows Vista, SVCHost.exe
Antivirus XP 2008/2009 Malware Up the Ante

Blog  According to US-CERT, the cybercriminals who are foisting fake antivirus programs, such as Antivirus XP 2008 and 2009 off on innocent users, are now doing more than just ripping people off for the purchase price of their worthless programs--they're going after personal and financial information. "If...

Last updated: Sep 19, 2008   1:30 AM GMT  |  Blog: Security Corner
Malware writers cook up a treat for Nigella fans

Blog   Celebrity cook Nigella Lawson has had her website (nigella.com) hacked by the increasingly dangerous SQL injection attacks doing the rounds. Visitors to the site could have found themselves leaving with rather more than a tasty recipe for avocado bruschetta. Downtime, in the interests of rese...

Last updated: Jul 18, 2008   2:13 PM GMT  |  Blog: Downtime   |      Security
Hackers rooting and jailbreaking mobile apps for evil malware creation

Blog  San Antonio based web application security specialist Denim Group has been airing its opinions on the security challenges facing developers looking at mobile app creation. The company asserts that mobile applications can be (especially) challenging to develop securely because they have "a very diff...

Last updated: Nov 1, 2011   2:48 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Operation Aurora: Tips for thwarting zero-day attacks, unknown malware

Blog  In December 2009, Google, Adobe and other companies were the victims of a damaging cyberattack called Operation Aurora. In this tip, expert Nick Lewis outlines the lessons learned from this attack, and how companies can avoid falling victim to similar attacks.

Last updated: Apr 15, 2010   6:25 PM GMT  |  Blog: Security Wire Weekly
Naraine, Roberts on Google Chrome, browser-based exploits and malware

Blog  In this episode of the Nameless Security Podcast, Dennis Fisher sits down with Paul Roberts, a security analyst with The 451 Group, and Ryan Naraine, a blogger and evangelist with Kaspersky Labs, to talk about the launch of Googles Chrome browser, the rash of browser-based exploits, the changing ...

Last updated: Sep 4, 2008   9:13 PM GMT  |  Blog: Security Wire Weekly
Channel news: Net-transfer speed could help spot malware; SAP skills continue paying offdate.

Blog  Speed could kill for Internet worms Computer security researchers are developing ways of protecting PCs from malicious programs known as worms by monitoring how fast data is sent through networks. [TimesOnline] Europe demands say on US data trawling Wants to rein in war on terror. [TheReg] SAP ski...

Last updated: Feb 15, 2007   12:59 AM GMT  |  Blog: Channel Marker
Channel news: Firefox URL bug supports malware; Sun exec charges Microsoft with patent terrorism"

Blog  Mozilla confirms own URL handling bug 'Turns out it's a problem with Firefox as well.' [TheReg] Sun exec accuses Microsoft of 'patent terrorism' The efforts of Microsoft to pressure the Linux community over alleged and unspecified patents is akin to "patent terrorism", according to Aussie executive ...

Last updated: Jul 25, 2007   11:49 AM GMT  |  Blog: Channel Marker
What type of malware virus spyware can change your phone's ESN number, APN settings, ISP SIM card and redirect web browsing control?

Answer  2014-present changed devices switched carriers changed numbers sim cards emails fb etc. I contacted LAPD, FTC, FCC and corporate offices for ISP but no help.

Last updated: Jun 19, 2016   11:24 PM GMT   |    Security, Spyware, Viruses
PREV 1...30   40   50...67   68   69   70   71   72   73   74   75   76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: