Search Results | Malware
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Haute Secure launch moves browser security front and center in fight against malware

Blog  Forget the desktop; the browser is quickly becoming the next battleground in the fight against malware. Google's acquisition this week of Postini got more attention, but its May purchase of browser virtualization vendor GreenBorder Technologies may prove to be just as important in the long run. With...

Last updated: Jul 11, 2007   2:22 PM GMT  |  Blog: Security Bytes
Mac OS Update Takes Care of Mac Malware

Blog  Apple has released an update for Mac OS X that addresses the recent scourge of Mac malware. The plague of rogue AV scareware apps has been a source of controversy and heated debate over the past few weeks. Mac users are trained to believe the OS is impervious, making them easier targets for social ...

Last updated: May 31, 2011   10:20 PM GMT  |  Blog: The Security Detail
Mac Malware Still Prowling About

Blog  I know that the whole MacDefender thing isn't making headline news everyday anymore, but that doesn't necessarily mean that attackers are done with Macs. On the contrary, Pandora's box has been opened, the Mac has made it onto the attacker's radar, and Mac users probably have a lot more of this to l...

Last updated: Aug 1, 2011   2:58 AM GMT  |  Blog: The Security Detail
Simple Malware Analyzing

Blog Excellent video, short and to the point with a good list of tools to get you started if you are interested in this kind of thing. If you do this, it's better to do this with a physical machine and not a virtual machine. Many malware wil...

Last updated: Oct 20, 2010   2:08 AM GMT  |  Blog: Irregular Expressions
2008s malware threat: anti-malware campaigns

Blog  A campaign to get people to buy anti-malware has misfired after users complained that the software maker was responsible for pop-up messages advertising pornography and drugs to improve sexual performance appearing on their PCs every two seconds. A lawsuit filed in Seattles King County Superior ...

Last updated: Mar 27, 2008   11:14 AM GMT  |  Blog: Downtime   |      Uncategorized
Nerds go wild at no-holds barred malware contest

Blog  A new contest running at the Nerdcon hacker event this year has caused a great deal of controversy. Hackers have had the gauntlet thrown down to them by being challenged to design malware that cannot be detected by Symantec or McAfee software. The contest is dubbed Race to Zero, which presumably re...

Last updated: Apr 30, 2008   4:40 PM GMT  |  Blog: Downtime   |      Uncategorized
Malware exploiting Windows Help Center vulnerability

Blog  Researchers at Sophos have detected malware that exploits the zero-day Windows XP flaw disclosed last week by a Google engineer. Disclosure of the flaw, which is contained in the Windows Help and Support Center, a Web-based feature providing technical support to end users, renewed the old debate ab...

Last updated: Jun 15, 2010   6:08 PM GMT  |  Blog: Security Bytes
TechTarget's weekly roundup (6/9 - 6/16)

Blog   SAP image via Shutterstock Are more organizations moving their SAP platform to the cloud? Tune into this week's roundup to find out. 1. HP cloud encryption gives IT pros data security control - Ed Scannell (SearchCloudComputing) HP's split-key cloud encryption technology could be just what IT sho...

Last updated: Jun 16, 2014   2:14 PM GMT  |  Blog: Enterprise IT Watch Blog   |      malware, Microsoft, SAP
Look how far we’ve come

Blog  Once upon a time, it was fairly simple for security researchers to identify and eliminate phishing sites or sites hosting malware. Most of them were hosted on sketchy domains, often in countries such as Brazil, Russia or the Czech Republic. If researchers couldn't get the owner of the domain to take...

Last updated: Jan 25, 2008   8:27 PM GMT  |  Blog: Security Bytes
Five steps to avoid webcam spying

Blog  If you recall, last year, Miss Teen USA, Cassidy Wolf's, computer was hacked and the hacker then attempted to "sextort" her by threatening to post nude photographs of her on various social media sites. The hacker employed the notorious Blackshades RAT malware on her laptop to do his dirty work. Here...

Last updated: Apr 30, 2015   7:11 PM GMT  |  Blog: Security Corner   |      Security, spy, Webcams
Adobe Reader at the Forefront of Malware Delivery

Blog  Statistics from a new study by F-Secure indicate that Adobe Reader has surpassed Microsoft Office products as a vector for malware delivery 2009. F-Secure has also pointed out that you can embed movies and songs, JavaScript, and forms that upload data a user inputs to a web server from within PDFs....

Last updated: Apr 15, 2010   6:49 PM GMT  |  Blog: Sister CISA CISSP
Spam from a possible zombie network (botnet)

Answer  For about a year now I've been getting notifications of different malware trying to infect my computer. I'm using Malwarebytes premium and Avast, also NordVPN for proxy.Still somehow my computer keeps getting these malware attacks, ranging from advare toransomware. These attacks come from differ...

Last updated: Mar 1, 2019   10:36 PM GMT   |    Spam
Use two computers: One for Internet and the other to work offline for safety

Answer  How to I keep my main computer safe from malware by using two computers?

Last updated: Oct 27, 2015   10:16 PM GMT   |    Computers, Security
Removable media scanned for malware

Answer  Why should removable media be scanned for malware on-demand and/or upon insertion?

Last updated: May 24, 2014   7:48 PM GMT   |    malware
Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

Answer  Do you know of any cases when malware will detect a virtualized OS and exploit this fact?

Last updated: Jun 22, 2009   3:19 PM GMT   |    malware, Microsoft virtualization, Microsoft Virtualization Chat 5/14
Cybersecurity today: IoT, obliterated boundaries and the need for automation

Blog  We recently released our latest "Threat Landscape Report," in which we gathered insights into the cybersecurity landscape around the world. The data spans the cybersecurity kill chain, focusing on three central aspects of the landscape -- including application exploits, malicious software and botnet...

Last updated: Jun 13, 2017   4:14 PM GMT  |  Blog: IoT Agenda   |      Botnet, cybersecurity, hyperconvergence
Open season on open source?

Blog  It was only a matter of time. With the recent news that a worm has infected the popular Microsoft Office alternative known as OpenOffice (across Windows, Mac and Linux platforms), some security industry watchers have begun to wring their collective hands. Because OpenOffice is the most popular offi...

Last updated: Jun 13, 2007   7:01 PM GMT  |  Blog: Channel Marker
Data breach analysis

Blog  I've been looking back at the recent history of data breaches. This resource at shows that of 126 private sector incidents, 40% were the result of laptop theft, and a further 30% alluding to human incompetence or insider "Malfeasance." F...

Last updated: Nov 25, 2007   9:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      data breaches
MitB attacks not new, but increasing in scale and sophistication, says ActivIdentity

Blog   The BBC ecently highlighted so-called man-in-the-browser (MitB) attacks that enable cyber criminals to get around the latest generation of calculator-style two-factor online banking security devices, but this form of attack is really nothing new. Criminal hackers have been wreaking havoc with the ...

Last updated: Feb 8, 2012   11:05 AM GMT  |  Blog: Read all about IT!   |      ActivIdentity, Man in the Browser, Online banking
Storm malware posing as fake security warnings

Blog  The Storm malware is using yet another trick in its endless push for world domination. Two weeks ago Storm passed itself off as a greeting card from family members to trick people into clicking on malicious URLs in their email inbox. Last week it tried to use patriotic messages to dupe people into g...

Last updated: Jul 9, 2007   12:47 AM GMT  |  Blog: Security Bytes
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: