Malware+tools

Showing results 1 to 20 of 34

SystHeal Optimizer

SystHeal Pro v2.2 is one of the cogent and reliable software optimizer that has various efficacious features creditable for provide...

February 16, 2014 by Systheal

Quick Heal Internet Security

Quick Heal Internet Security protects your laptops and desktops and provides protection against all kinds of Internet or network-based...

November 7, 2011 by Quick Heal Technologies

PCRepair Tools 2012

Remove all kind of malware and other unknown harmful files from your computer at once, no database required, scan your system online...

October 11, 2011 by InCode Solutions

Internet Explorer 9 Platform Preview

The IE9 Platform Preview isn't a beta release of the next Internet Explorer browser; in many ways it's not a full browser and you certainly wouldn't want to use it for your day to day browsing (and Microsoft doesn't want you to). There's no address bar, no back button, no tabs, no favourites, no error messages if pages don't load and none of the usual browser tools, including no malware protection.

March 17, 2010

Confessions of a Windows 7 pirate

I've been hanging out with a bad crowd lately, trying out popular hacking tools and utilities to see if I could install Windows 7 without paying for it. Unfortunately, I succeeded. In this post, I'll share my experiences, including close encounters with some very nasty malware and some analysis on how the latest showdown between Microsoft and the pirates is likely to play out.

March 2, 2010

Conficker worm's copycat Neeris spreading over IM

Imitation has always been a form of flattery, and that's particularly true for the cybercrime ecosystem. From the lone Chinese cybercriminals releasing DIY tools for generating malware actively exploiting the MS08-067 flaw, followed by the original Conficker worm, Microsoft's MMPC (Malware Protection Center) is reporting on a currently spreading Conficker copycat detected as Worm:Win32/Neeris.

April 7, 2009 by

Developer guidance on “unsafe” cryptographic algorithms

With the UK’s Infosecurity Europe show little more than a month away now, the security vendor community is busily polishing up its latest batch of cure-alls and wonder-tools to aid developers and security specialists in the good fight against ‘rouge’ code.There will be talk of firewalls, new detection techniques and possibly even self-learning apps that use social networking threads to gauge threat status as viral malware starts to evidence itself across the web.

March 20, 2009 by

Microsoft's Live launches malware detection service for webmasters

Playing catch-up with Google's Safe Browsing diagnostic, Google's warnings for potentially hackable sites, and Yahoo's SearchScan introduced through their partnership with McAfee, Microsoft's Live Search has updated their Webmaster tools to offer detection for embedded malware. Moreover, as a late entrant they simply had to differentiate, and they did it in the form of providing outbound links check for whether or not the ongoing links have also been embedded with malware.

November 26, 2008 by

Commercial vendor of spyware under legal fire

Just like every decent marketer out there, vendors of commercial malware tools are very good at positioning their tools. However, their pitches often contradict with themselves in a way that what's promoted as a Remote Administration Tool, has in fact built-in antivirus software evading capabilities, rootkit functionality and tutorials on how to remotely infect users over email.

November 18, 2008 by

Gmail, Yahoo and Hotmail's CAPTCHA broken by spammers

Breaking Gmail, Yahoo and Hotmail's CAPTCHAs, has been an urban legend for over two years now, with do-it-yourself CAPTCHA breaking services, and proprietary underground tools assisting spammers, phishers and malware authors into registering hundreds of thousands of bogus accounts for spamming and fraudulent purposes.

July 2, 2008 by

Attacks on NFC mobile phones demonstrated

Yesterday, Collin Mulliner of the trifinite.group, a group of computer experts researching insecurities in wireless communications, has released the slides as well as the research tools he came up with in order to demonstrate various attacks and vulnerabilities in Near Field Communication mobile phones, a technology that will change the face of mobile payments, and naturally result in more innovative mobile phishing and malware attempts.

May 28, 2008 by

Redmond Magazine Successfully SQL Injected by Chinese Hacktivists

Irony at its best. It appears that Redmond - The Independent Voice of the Microsoft IT Community, formerly known as Microsoft Certified Professional Magazine is currently flagged as a badware site, and third-party exploit detection tools are also detecting internal pages as exploit hosting ones, in this particular case Mal/Badsrc-A.

May 16, 2008 by

Apple plugs holes in Xcode

Apple has shipped a new version of its Xcode Developer Tools to patch three security holes that allow malicious hackers to launch code execution or privilege escalation attacks.

October 31, 2007 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories