Search Results | Malware
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Microsoft says all versions of Internet Explorer vulnerable to XML attack

Blog  The Internet Explorer vulnerability saga continues to unfold. Microsoft late Thursday released more information about the unpatched XML flaw in IE, and confirmed that the vulnerability in fact affects all supported versions of IE, not just IE 7 as previously thought. Microsoft Malware Protection Cen...

Last updated: Dec 12, 2008   3:07 PM GMT  |  Blog: Security Bytes
How to bypass Vista UAC in two easy steps

Blog  One of the security features in Vista that has gotten a lot of attention is User Account Control (UAC), but not necessarily for the reasons that Microsoft officials might have been hoping for. UAC was the subject of one of those clever Mac and PC commercials that Apple is running and now a researche...

Last updated: May 15, 2007   6:08 PM GMT  |  Blog: Security Bytes
Is ubiquitous malware infection inevitable?

Blog  Are we rapidly approaching that day when every device attached to the internet carries some sort of malware? A recent SANS NewsBites carried this comment after a blurb about Stuxnet: [Editor's Note (Skoudis): A few years ago, Marcus Sachs mentioned to me an intriguing idea. He said, someday, it is p...

Last updated: Nov 24, 2013   10:25 PM GMT  |  Blog: Security Corner   |      Security
More Mac fake AV stuff


Last updated: May 19, 2011   4:40 AM GMT  |  Blog: Irregular Expressions
Israeli Mossad add Trojan Horse to Syrian laptop

Blog  Data stealing malware helped Israeli spies reap data from officials laptop. Sophos security guru Graham Cluley writes today about the Mossad, Israels intelligence gathering operation and how spies there gained access to a Syrian officials laptop and uploaded a Trojan to collect data. Accor...

Last updated: Nov 6, 2009   2:18 PM GMT  |  Blog: Security Bytes
Infected PC? Refresh or restore

Blog  The more things change, the more they stay the same. I'm still seeing PCs with serious malware infections that defy any and all attempts to clean them up. I used to persevere and eventually succeed in killing whatever beasties were inhabiting the dark recesses of the system. Just last week, I fought...

Last updated: Aug 30, 2015   0:36 AM GMT  |  Blog: Security Corner   |      malware, Restore, Security
How much of your spam contains malware?

Blog  I am in my second year of using's excellent spam filtering service. I cannot recommend them enough. My main email account is so spam-free that I sometimes don't even check the admin interface to see what MailRoute has been filtering for me. Today, I was curious to see just how much of ...

Last updated: Mar 17, 2013   10:27 PM GMT  |  Blog: Security Corner
Redux: Infected device? Refresh or reload

Blog  The more things change, the more they stay the same. I'm still seeing PCs with serious malware infections that defy any and all attempts to clean them up. I used to persevere and eventually succeed in killing whatever beasties were inhabiting the dark recesses of the system. Just last week, I fought...

Last updated: Jun 14, 2008   1:57 PM GMT  |  Blog: Security Corner   |      malware, Security, System Restore
Tidserv request 2 attack: Virus or malware?

Answer  Norton is giving me a message saying a tidserv request2 was block, is this a virus or malware infection?

Last updated: Oct 26, 2010   5:01 PM GMT   |    Antivirus, backdoors, malware

Answer  is there a malware on mobile devices specifically on android that can leak all of your photos in a site?

Last updated: Jun 14, 2019   1:44 AM GMT   |    , Android phones, malware
VMware Releases Browser Appliance Virtual Machine

Blog  The Browser Appliance is a free virtual machine that allows users to securely browse the Internet using Mozilla Firefox. Run the Browser Appliance with VMware Player to: Protect Against Adware and Spyware: Users protect their PCs against adware, spyware and other malware while browsing the Internet...

Last updated: Jan 3, 2006   3:05 AM GMT  |  Blog: RTFM Education – Virtualization, VMware, Citrix
Fake Grand Theft Auto ad downloads malware

Blog  Attackers are using YouTube to dupe gaming enthusiasts into downloading malware, FaceTime Security Labs is warning in its SpywareGuide blog. The YouTube video is safe, just the bait to get users to click on a link and download the infection. At the end of the video, a site is listed where people ca...

Last updated: Jul 2, 2007   6:57 PM GMT  |  Blog: Security Bytes
But Wait! Apple Says it's Just Kidding About Antivirus

Blog  If you tried to click through to the link in my December 2d article, you probably saw this page: Apple has taken down their notice recommending that users install multiple antivirus programs on their Mac computers. They said it was "because it was old and inaccurate." Could the real reason be t...

Last updated: Dec 9, 2008   2:33 AM GMT  |  Blog: Security Corner
isearch toolbar

Answer  Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

Last updated: Apr 12, 2005   10:34 PM GMT   |    Administration, Documentation, Features/Functionality
Flame malware analysis, How to defend against fraudulent certificates

Blog  Security expert Nick Lewis analyzes Flame malware, plus gives tips for dealing with Flame's most unique function: its use of fraudulent certificates.

Last updated: Sep 20, 2012   6:42 PM GMT  |  Blog: Security Wire Weekly
Use software composition analysis to secure the industrial IoT

Blog  Earlier this year, botnets attacked networked security cameras, shining a light on the vulnerability concerns around industrial systems and the industrial IoT. As with any device connected to the internet, these types of devices have characteristics that make them a compelling target for botnet auth...

Last updated: Mar 29, 2018   5:00 PM GMT  |  Blog: IoT Agenda   |      Bill of Materials, Botnet, IIoT
Taking the offensive on endpoint security

Blog  Buzz phrases of the day include consumerisation of IT and BYOD--bring your own device. The former phrase refers to the use of increasingly powerful and feature-rich devices, be they PCs, smartphones or tablet computers, by consumers. The meteoric rise of the tablet computer embodies this trend. Acco...

Last updated: Feb 27, 2012   12:18 AM GMT  |  Blog: Bloor Security   |      Cloud Computing, Endpoint security, SaaS
Dear Secret Service: Don't Poke USB Sticks in Things

Blog  The Secret Service is scrambling to prove that its agents are, too, competent and know better than to poke USB sticks in things. As you probably know, a Chinese woman was caught at President Donald Trumps Mar-a-Lago resort with four cellphones, nine thumb drives, a laptop and an external hard dr...

Last updated: Apr 16, 2019   2:09 PM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery   |      government, Security
Where can I find info on recent malware updates?

Answer  Where can I find info on recent malware updates? This question is from the Microsoft Live Chat which took place on July 13th.

Last updated: Jul 29, 2010   8:07 PM GMT   |    malware, Security
Spear phishing and targeted attacks

Blog  Catalin Cosoi, head of the online threats lab at BitDefender on spam and malware analysis, the Waledac spambot takedown and the hacktivism trend.

Last updated: Aug 17, 2011   8:56 PM GMT  |  Blog: Security Wire Weekly
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: