Showing results 1 to 20 of 25

August 17, 2015 By Kaspersky Lab

Kaspersky Internet Security 2016

Kaspersky Internet Security delivers premium PC protection from all Internet threats, including the most sophisticated of them, ensuring...

August 9, 2011 by

Why do people fall for Trojans?

Out in the physical world, crime happens every day. People get robbed and have their pockets picked, and no one blames the victim. So why do the rules change when nontechnical PC users fall for a Trojan online?

February 16, 2014 By Systheal

SystHeal Optimizer

SystHeal Pro v2.2 is one of the cogent and reliable software optimizer that has various efficacious features creditable for provide...

October 13, 2010 By Phantom Armor

Phantom Armor

Phantom Armor is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against...

March 6, 2006 by

Standoff over PC-to-mobile jumping code

Mobile anti-virus researchers and anti-virus companies are at loggerheads over access to code for a PC-to-mobile Trojan. The Mobile Anti-virus Researchers Association (MARA) said that it had received proof-of-concept code last week for Crossover, which MARA claims is malicious software that can jump from a Windows desktop machine to a Windows Mobile Pocket PC handheld.

July 26, 2005 by

Hosting sites help hackers recruit 'zombies'

Web sites offering free hosting services are increasingly being used by hackers to store and distribute malware, according to Internet security firm Websense. The company said yesterday it had noticed an "alarming" increase in the first two weeks in July in the use of free Web space services for distributing malware such as keyloggers, Trojan horse downloaders and spyware.

June 1, 2005 by

Trojan horse could recruit 'Fagin's gang'

A recent malware attack in which a Trojan encrypts a user's files until the victim pays a US$200 'ransom', could help criminal groups recruit people into money laundering and other 'dirty work', according to security experts.Security company Websense last week highlighted an attack where a Web site is configured to exploit a known flaw in Microsoft's Internet Explorer to download an application that encrypts files on the victim's PC.

October 20, 2004 by

Norton AntiVirus ignores malicious WMI instructions

Symantec's flagship consumer antivirus application contains a vulnerability that can allow certain malicious scripts to pass through without being scanned, according to a security researcher.Dan Milisic, a security researcher based in Canada, told ZDNet Australia that Norton AntiVirus's script blocker ignores certain VBscript using Windows Management Instrumentation (WMI), which could allow an apparently protected PC to be infected by a Trojan without detection.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular