Showing results 1 to 20 of 46


Do you know that your computer can be easily compromised or hacked by many ways ? You can prevent that using better security applications....

January 20, 2015 By NoahThompsonsdf25

Malwarebytes Anti-Malware

Malwarebytes Anti-Malware combines powerful new technologies built to seek out, destroy, and prevent malware infections. Malwarebytes...

December 2, 2014 By Malwarebytes

Suryl Guardian

Suryl Guardian is a the simplest PC recovery tool available. Users can easily undo PC problems by going back to a time before the problems...

November 17, 2014 By Suryl

Google sponsored links spreading (scareware) rogue AV

Malware hunters at Websense Security Labs have discovered legitimate Google sponsored links being used to plant scareware programs (rogue anti-virus applications) on the computers of Windows users.In a blow-by-blow description of the rogueware attack, Websense researcher Elad Sharf shows how an innocent Google search for the Winrar file archiver and data compression utility can lead to a fake C|Net downloads.

December 16, 2008 by

Secunia: popular security suites failing to block exploits

In a recently conducted comparative review, Danish security company Secunia, tested the detection rate of 12 different Internet Security Suites against 300 exploits (144 malicious files and 156 malicious web pages) affecting popular end user applications, to find that even the top performer in the test is in fact performing poorly in general. Their conclusion :"These results clearly show that the major security vendors do not focus on vulnerabilities.

October 14, 2008 by

Don't buy stand-alone antivirus: Trend Micro

Stand-alone antivirus applications were dangerous because they could not adequately protect users and so created a false sense of security, according to the top malware expert at Trend Micro. However, the company continues to sell its stand-alone antivirus app because of 'customer demand'.

September 23, 2008 by

OS fingerprinting Apple's iPhone 2.0 software - a "trivial joke"

Just like every decent web service out there wanting to identify the iPhone's mobile Safari browser in order to serve custom applications, in this very same way malicious attackers would like to remotely identify iPhone devices through a basic pen-testing practice known as OS detection or OS fingerprinting. It seems that the difficulty level of identifying an iPhone device using nmap's criteria is a "trivial joke", namely, it's too easy to accomplish :"So, nmap 4.

July 30, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories