Malware+networks

Showing results 1 to 20 of 44

Enprobe

EnProbe is a cloud based scalable and lightning fast vulnerability assessment service for businesses of all sizes. EnProbe helps website...

October 8, 2013 by Entersoft Information Systems

Network Security Task Manager Portable

Network Security Task Manager is an application to detect malware. Network Security Task Manager helps to detect industrial espionage,...

February 21, 2013 by A. & M. Neuber Software

Flame used Windows Update to spread

Security researchers have discovered that Windows Update is partly responsible for how the Flame malware spreads across networks and how it is able to infect fully patched versions of Windows 7.

June 4, 2012 by

Network Security Task Manager

Network Security Task Manager is an application to detect malware. Network Security Task Manager helps to detect industrial espionage,...

February 21, 2013 by A. & M. Neuber Software

'Malnets' to become a new security issue

Nearly two thirds of all new cyber attacks will derive from malware networks, according to a new report from web-security and WAN-solutions provider Blue Coat.

February 13, 2012

Why malware networks are beating antivirus software

This week I'm watching a gang of malware distributors preying on Windows users. How are traditional antivirus programs doing against this particular threat? The case study shows why signatures and scans offer imperfect protection.

August 3, 2011

Report: Cyberattackers hit Google staff via friends

People behind the China-based online attacks of Google and other companies looked up key employees on social networks and contacted them pretending to be their friends to get the workers to click on links leading to malware, according to a report.

January 25, 2010 by

Data Privacy: What Part of Your Network Is Vulnerable, and What Can You Do About It?

Doc thinks networked environments are both a boon and a burden to organizations. They greatly improve productivity and reduce cost by allowing customers, vendors, partners, employees, and other stakeholders to share and access information in real time. But increased access to sensitive information makes networks vulnerable to malicious activity and misuse. There have been numerous high-profile data security breaches and losses, prompting a rise in government regulations surrounding data privacy.

January 21, 2010

Mac botnet being used in DDOS attacks

Back in January pirated versions of iWork '09 being shared on P2P networks were discovered to contain a trojan horse called "iWorkServices." The author of the malware did his thing by adding a malicious binary to the trial version of the software package.

April 20, 2009 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories