This offers AWS customers in the region a variety of security modules, such as data encryption, firewall, anti-malware, web reputation and integrity monitoring, and compliance controls.
Showing results 1 to 20 of 60
When Google accuses you of serving malware or spam from your web site it's a humiliating outrage. The company has improved their tools for you to recover your site and its reputation.
Apple's iMessage is believed to be among the most secure, surveillance-proof messaging tools. But hackers have exposed a flaw that allows malicious interception, impersonation, and the viewing of private messages.
Sending a specially crafted packet to an Intel 82574L Ethernet controller can cause the hardware to hang, and the 'packet of death' could be put to malicious use and crash systems even when protected by a firewall.
The rising sophistication of cybercriminals is blurring the characteristics between their tools and state-sponsored malware, making it harder to attribute attacks.
Multiple security firms are now offering clean-up tools that target the password- and cookie-stealing malware, and both Kaspersky and Bitdefender reckon it's another state-sponsored security issue
Want to avoid being attacked by viruses and other malware? Two recent studies reveal the secret: regular patching. A fully patched system with a firewall enabled offers almost complete protection against drive-by attacks and outside intruders.
Microsoft has confirmed that its security tools erroneously removed the Google Chrome browser from Windows machines, marking it as a variant of the notorious Zeus (Zbot) malware family.
Fake antivirus attack that uses Web advertisements to lure users into Shnakule, the world's largest malware delivery network, undetected by most antivirus tools, warns Blue Coat.
Jack Wallen briefly evaluates the pros and cons of 10 firewall tools (four of them free) that might fit your needs.
Employee use of Facebook, Twitter and other social tools is leading to malware infections, legal challenges and other problems that are costing businesses money, according to the security company
Malicious hackers are preying on iPhone users who want to jail-break their devices, exploiting the increased interest around jail-breaking tools to launch malware attacks.
The IE9 Platform Preview isn't a beta release of the next Internet Explorer browser; in many ways it's not a full browser and you certainly wouldn't want to use it for your day to day browsing (and Microsoft doesn't want you to). There's no address bar, no back button, no tabs, no favourites, no error messages if pages don't load and none of the usual browser tools, including no malware protection.
TechRepublic's Bill Detwiler examines three types of anti-malware tools and explains how they can find and remove malware.
I've been hanging out with a bad crowd lately, trying out popular hacking tools and utilities to see if I could install Windows 7 without paying for it. Unfortunately, I succeeded. In this post, I'll share my experiences, including close encounters with some very nasty malware and some analysis on how the latest showdown between Microsoft and the pirates is likely to play out.
Imitation has always been a form of flattery, and that's particularly true for the cybercrime ecosystem. From the lone Chinese cybercriminals releasing DIY tools for generating malware actively exploiting the MS08-067 flaw, followed by the original Conficker worm, Microsoft's MMPC (Malware Protection Center) is reporting on a currently spreading Conficker copycat detected as Worm:Win32/Neeris.
With the UK’s Infosecurity Europe show little more than a month away now, the security vendor community is busily polishing up its latest batch of cure-alls and wonder-tools to aid developers and security specialists in the good fight against ‘rouge’ code.There will be talk of firewalls, new detection techniques and possibly even self-learning apps that use social networking threads to gauge threat status as viral malware starts to evidence itself across the web.
In our conversations with many information and knowledge management professionals, it's clear that their distributed and multicompany teams need better extranet collaboration tools.And they feel the problem is only getting worse as companies go virtual, global, distributed, outsourced, green, travel-less, and partnered, thus driving the need for ever-better collaboration tools that work outside the firewall.
Playing catch-up with Google's Safe Browsing diagnostic, Google's warnings for potentially hackable sites, and Yahoo's SearchScan introduced through their partnership with McAfee, Microsoft's Live Search has updated their Webmaster tools to offer detection for embedded malware. Moreover, as a late entrant they simply had to differentiate, and they did it in the form of providing outbound links check for whether or not the ongoing links have also been embedded with malware.
Every week, more and more bits of malware seem to be making their way past commercial anti-virus, firewall anti-virus, and ISP anti-virus software. New patches and downloads abound, and I've still re-imaged 3 computers in the last 2 weeks due to massive infestations.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)