Search Results | Malware
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT
Sort by:  Most Relevant  |  Date
Fun anti-malware site

Blog  I found this stumbling around the Internets. Nice little list for starting research.

Last updated: Sep 17, 2010   2:13 AM GMT  |  Blog: Irregular Expressions
Windows 8: Protecting against Malware

Blog  With each incarnation of Windows, Microsoft has made the operating system more secure by default. Windows 8 is no exception. In Windows 8, Microsoft has enhanced many of the existing security controls from Windows 7, and added some new stuff as well. For one thing, rather than having Windows Defend...

Last updated: Sep 26, 2011   7:08 PM GMT  |  Blog: The Security Detail
A little flame malware info

Blog  They don't list the source study but I found one line of this worth pointing out. " The study also suggests Flame dates back to 2006, much earlier than previously thought. " That right there is pretty amazing to me, for having this level of sophistic...

Last updated: Sep 19, 2012   4:51 AM GMT  |  Blog: Irregular Expressions
VMWare Malware Lab - Networking Edition

Blog  When doing analysis I try to keep away from the infection machine, I keep my lab statically setup with an IP, and DNS, Gateway pointing at another machine. For a basic target all you need to do is have tcpdump running to capture any networking requests. If you want to get more complicated you can ...

Last updated: Aug 16, 2012   0:28 AM GMT  |  Blog: Irregular Expressions
Malware programs for 64x PCs

Answer  I am looking for 64 bit AntiVirus and Spyware software for clients in an enterprise edition. I can put the console on a 32 bit 2003 server. Any ideas? So far all I have found is Computer Associates enterprise version but that only covers AV not spyware. ForeFront does both but trying to buy it from ...

Last updated: Apr 18, 2008   12:18 AM GMT   |    Antispyware, Antivirus, Antivirus software
Japan Quake Spam Links to Malware

Blog  Surprised? You shouldn't be. This type of thing seems to happen every time there is a major disaster anywhere in the World. We saw it with Katrina, the Indonesian tsunami, and countless others. The slime-bag criminals have no scruples and will take any opportunity to steal a buck from unsuspecting...

Last updated: Mar 23, 2011   0:10 AM GMT  |  Blog: Security Corner
Bogus funeral announcement points to malware

Blog  [caption id="attachment_1227" align="alignleft" width="285"] Source:[/caption] One of the latest tricks in the cyber-criminals' bags is an email with the subject (it varies), "Death and Funeral Announcement." Now, what normal person would see that and NOT open it? I know I did. What...

Last updated: Jan 26, 2014   4:57 PM GMT  |  Blog: Security Corner
Do I have malware on my system?

Answer  I have been told that if you cannot see your start-up item in the system configuration utility window under the start-up tab, that's an indication that you have spyware. Is there any true to this?

Last updated: Mar 4, 2008   5:53 PM GMT   |    malware, Windows Security, Windows tools/WSRM
Preparing for future security threats, evolving malware

Blog   Security expert Nick Lewis predicts how infosec threats will evolve in 2010. Luckily, enterprise defenses will evolve, too.

Last updated: Jan 21, 2010   2:33 PM GMT  |  Blog: Security Wire Weekly
If One Free Malware Removal Program Costs $0.00, How Much do Three Malware Removal Programs Cost?

Blog  Oh, oh, oh. A friend's computer isn't working right. Could it be a virus? Or just as likely, a worm, which many people would call a virus even if it isn't one? The traditional troubleshooting technique here is, "When in danger or in doubt, run in circles, scream and shout." But we're smarter than th...

Last updated: Jun 7, 2013   4:25 PM GMT  |  Blog: Cheap Computing
Antivirus XP 2008/2009 Malware Up the Ante

Blog  According to US-CERT, the cybercriminals who are foisting fake antivirus programs, such as Antivirus XP 2008 and 2009 off on innocent users, are now doing more than just ripping people off for the purchase price of their worthless programs--they're going after personal and financial information. "If...

Last updated: Sep 19, 2008   1:30 AM GMT  |  Blog: Security Corner
Malware removal software vs hard drive sanitation software

Answer  My computer has slowed to a snails pace. Suspecting spyware or a virus I tried downloading free removal software from the internet such as AVG, Noadware, etc. Some were bait and switch offering scans but charged for removal. Usable free removal software had not effect and did not work. Would sanita...

Last updated: Aug 1, 2008   2:26 PM GMT   |    malware, Spyware, Viruses
SVCHOST.EXE is malware which infects the registry

Answer  How do I delete this registry infection? The problem appears under the name 'INTERACTIVE SERVICES DIALOG DETECTION' and prevents printer function (in my case). I have tried using MS Config to eliminate unknown downloads but that didn't work . Have tried several registry 'cleaners' without success.

Last updated: Mar 26, 2013   4:08 PM GMT   |    malware, Microsoft Windows Vista, SVCHost.exe
Malware turned system restore off through group policy

Answer  system restore turned off thru grouppolicy... help spy ware bug and cant remove antimalware doctor

Last updated: Oct 22, 2010   3:23 AM GMT   |    Antispyware, Group Policy, malware
One-Third of Pirated Windows 7 Contains Malware

Blog  Microsoft has developed an update for Windows 7 designed to detect more than 70 known activation exploits and attempt to identify counterfeit copies of Windows 7. Obviously, users who knowingly use pirated versions of Windows 7 will not apply the optional update, but what about those who think thei...

Last updated: Feb 15, 2010   3:19 AM GMT  |  Blog: Tech Strategy Trends
Malware writers cook up a treat for Nigella fans

Blog   Celebrity cook Nigella Lawson has had her website ( hacked by the increasingly dangerous SQL injection attacks doing the rounds. Visitors to the site could have found themselves leaving with rather more than a tasty recipe for avocado bruschetta. Downtime, in the interests of rese...

Last updated: Jul 18, 2008   2:13 PM GMT  |  Blog: Downtime   |      Security
Hackers rooting and jailbreaking mobile apps for evil malware creation

Blog  San Antonio based web application security specialist Denim Group has been airing its opinions on the security challenges facing developers looking at mobile app creation. The company asserts that mobile applications can be (especially) challenging to develop securely because they have "a very diff...

Last updated: Nov 1, 2011   2:48 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Naraine, Roberts on Google Chrome, browser-based exploits and malware

Blog  In this episode of the Nameless Security Podcast, Dennis Fisher sits down with Paul Roberts, a security analyst with The 451 Group, and Ryan Naraine, a blogger and evangelist with Kaspersky Labs, to talk about the launch of Googles Chrome browser, the rash of browser-based exploits, the changing ...

Last updated: Sep 4, 2008   9:13 PM GMT  |  Blog: Security Wire Weekly
Operation Aurora: Tips for thwarting zero-day attacks, unknown malware

Blog  In December 2009, Google, Adobe and other companies were the victims of a damaging cyberattack called Operation Aurora. In this tip, expert Nick Lewis outlines the lessons learned from this attack, and how companies can avoid falling victim to similar attacks.

Last updated: Apr 15, 2010   6:25 PM GMT  |  Blog: Security Wire Weekly
Channel news: Net-transfer speed could help spot malware; SAP skills continue paying offdate.

Blog  Speed could kill for Internet worms Computer security researchers are developing ways of protecting PCs from malicious programs known as worms by monitoring how fast data is sent through networks. [TimesOnline] Europe demands say on US data trawling Wants to rein in war on terror. [TheReg] SAP ski...

Last updated: Feb 15, 2007   12:59 AM GMT  |  Blog: Channel Marker
PREV 1...30   40   50...68   69   70   71   72   73   74   75   76   77 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: