The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
Articles about Malware
June's cyber threat landscape gallery, features images from the malware, spam, phishing and crimeware campaigns that took place during the month. See also: Image Gallery: April's cyber threat landscape
Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.
In need of a fresh example that cybercriminals are actively looking for ways to monetize infected Mac OS X hosts? Early-stage discussions at several web forums, including a PoC (proof of concept, source code included) as well as the following potential layouts speak for themselves.Read the article: Mac OS X SMS ransomware - hype or real threat?
McAfee Total Protection 2010 is the latest in McAfee's security stable to offer all the bells, whistles and options that the company can squeeze into one security suite. This program is nothing if not extensive, as the following screenshots show.
The gang behind the Koobface botnet is periodically updating the template it relies on for infecting new years. Here are some of the most popular ones introduced by the gang throughout the year.
Microsoft has launched a new free security package today dubbed Microsoft Security Essentials.
This week Symantec made beta versions of its flagship Norton Internet Security 2010 and Antivirus 2010 products available for testing. We put NIS 2010 through its paces to see how it stacks up.
Taking a look at Microsoft Security Essentials, a free security product from Microsoft.
This gallery offers an inside view of those "beneath the radar" botnets that never make the news. The images have been collected throughout the past year by using open source intelligence, namely, by either joining the command and control IRC channel upon infection, or monitoring ongoing communications between the botnet masters.If you ever wanted to take an inside view of targeted-botnets primarily run by novice cybercriminals sometimes utilizing outdated, but very effective methods - this gallery is for you.
Finally, you can run your antivirus at the gateway, thanks to the $330 IPCop/Copfilter firewall 25-watt appliance -- no gimmicks or hacks.
Here's a list of ten free security tools you can and should be using to help protect, disinfect and manage your Windows computer.
This gallery takes a look at Haute Secure, a new Internet Explorer add-on that promises to block drive-by exploits from compromising Windows computers.
Vista offers 800 new Group Policy settings, some that pertain to added features and others that enhance control over features carried over from Windows XP. Deb Shinder offers a detailed look at some of Vista's more interesting Group Policy additions: access to removable media, power management, and User Account Control policies.
Investigate the inner workings of your computer with Security Task Manager!