This offers AWS customers in the region a variety of security modules, such as data encryption, firewall, anti-malware, web reputation and integrity monitoring, and compliance controls.
Showing results 1 to 20 of 135
A new report finds that number of mobile malware modifications designed for phishing users' banking and bank card information jumped by a factor of 20 last year.
25 years ago this Saturday, November 2, 1988, much of the Internet - still very small at the time - crashed. The cause was a selfish experiment, turned Frankenstein monster, instigated by a graduate student at Cornell named Robert Morris.
Sending a specially crafted packet to an Intel 82574L Ethernet controller can cause the hardware to hang, and the 'packet of death' could be put to malicious use and crash systems even when protected by a firewall.
Government officials say Symantec's report on the recently discovered Narilam malware, targeting Iran, shows "some misunderstanding" and play down significance and severity of the worm.
The Gauss worm appears to share a common purpose with the Stuxnet and Flame malware in suspected computer espionage. But two of its elements have been baffling experts.
Researchers at Kaspersky Labs have detected an example of a breed of malware that uses a cross-browser plugin to create a worm that works across multiple browsers.The LilyJade worm malware spoofs ad modules on Yahoo, YouTube, Bing, MSN, AOL, Google and Facebook.
In a pair of candid blog posts, a member of Oxford's network security staff says the Flashback malware episode is the worst they've seen since the Blaster worm of 2003. And Apple is "making minimal effort" and "putting customers at risk."
Want to avoid being attacked by viruses and other malware? Two recent studies reveal the secret: regular patching. A fully patched system with a firewall enabled offers almost complete protection against drive-by attacks and outside intruders.
The criminal gangs that specialize in malware love search engines, because they represent an ideal vector for getting Windows users to click on links that lead to potentially dangerous Trojans. The latest attack targets ads, and the social engineering is frighteningly good.
What's the best way to deal with malicious software on PCs and Macs? You can't answer that question until you know how malware gets installed in the first place. Here's a reality check.
The Trojans are designed to steal digital wallets for the virtual currency from users' machines and convey it to the malware owner
Sorry, Windows users. Switching to a different browser than Internet Explorer won't immunize you from malware attacks. The bad guys have begun preying on that misplaced confidence to push dangerous software, including Trojans and scareware. Here's a live, very dangerous example.
Recent massive wave of Web site attacks using SQL injection not new, and Trojans still form an effective component of cybercriminals' malware weaponry, says security vendor.
A fast-moving Twitter worm is in circulation, using Google's goo.gl redirection service to push unsuspecting users to a notorious scareware (fake anti-virus) malware campaign.
The Stuxnet worm got some big play from Iranian President Mahmoud Ahmadinejad, who acknowledged that the malware dinged his nuclear program.
Symantec security researcher Liam O Murchu posits a possible Stuxnet worm attack scenario. His speculation is driven by the technical features of the sophisticated malware threat.
The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference with a prominent security researcher dropping a raw hint that Israel may be behind the industrial-strength malware attack.
The Stuxnet worm has hit the big time after Iranian officials confirmed that the malicious code was wreaking havoc at its first nuclear power station. Stuxnet chatter that started in July boiled over three months later.
Anti-malware companies are tracking a new "download-and-run" e-mail worm squirming through inboxes around the world.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)