Articles about Malware
A collection of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
A critical security flaw in a plugin called WP-Slimstat is to blame.
Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.
Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Security experts say The Equation Group surpasses every other threat actor known in complexity and sophistication.
A collection of notable security news items for the week ending February 13, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Around 16 million mobile devices worldwide were hit by malware as of the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.
Symantec has explored the realm of phishing kits and how they can be used to conduct professional-looking campaigns against unsuspecting victims.
The sheer number of alerts that security folk have to go through means they are playing a game that they will eventually lose.
A collection of notable security news items for the week ending February 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Researchers say they have identified malware which aims to steal data from iOS devices as part of a targeted attack.
Sony's Amy Pascal has resigned as co-chair of the company following a disastrous cyberattack which cost the company dearly both financially and in reputation.
Anthem's hack and issues around organization accountability with PII is cause to protect ourselves from identity theft and more, including security freeze, fraud alert, and account recovery.
The region, first known as a computer virus factory, has since became one of the most advanced security hubs in the world, housing companies like Kaspersky, Bitdefender, and ESET. This is how it happened.
A security researcher disclosed Monday over 99 percent of About.com's topic links and domains are vulnerable to open XSS and Iframe Injection (XFS) attacks.
It's nasty, but you don't have to be held to ransom by it.
What scams and schemes do you need to watch out for during the holiday season?
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime.
On the fifth day of Christmas, my true love gave to me, an app which stole my identity.
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.
They don't make malware like they used to. Literally.Back in 2002, Microsoft and its customers were forced to deal with an unprecedented outbreak of attacks on Windows that threatened the company's survival. In this gallery, I show how malware authors and Microsoft's security response have evolved over the past decade.
It's been almost 25 years since the first PC computer virus left users looking at corrupted floppies, lost work and perplexing messages. In that time, the art of automated malfeasance has progressed to the point that it's part of the armoury of international geopolitics.
One of the great myths of security is that if your PC is infected with malware it’s your own fault. You shouldn’t have been searching for porn, downloading pirated software, or snagging bootleg DVDs from BitTorrent.But that's no longer true. These days, even ads on a legitimate web page can lead to unwanted, potentially malicious software. Here's an example.
In May 2011, Apple issued its first-ever security update designed to remove malware on Macs. Has Apple's response to Mac Defender been good enough for its customers? And is Apple prepared for the next attack? This gallery shows what Apple has done with Security Update 2011-003.
Want proof that the bad guys are starting to target Mac users? Take a look at this series of screens, which show an attempt to convince a user to install a fake antivirus program that has a nasty payload
If you think switching to Google Chrome will protect you from socially engineered malware attacks, think again.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
At the RSA Conference in San Francisco, Symantec CEO Enrique Salem reveals what he thinks the security of the future will look like. Among the things he says we need to do? Make security risk-based, info-centric, automated, and work-flow driven to keep up with security threats.
Sponsored: There's no shortage of malicious code on the Internet. Agent Peterson of the Geek Squad offers some tips on how to protect yourself from viruses and spyware.The content for this video was sponsored and provided by Geek Squad.
The co-founder of antivirus firm Sophos said that the Apple Mac is not a virus-free platform; he also believes that Windows can be as secure as Linux -- if it is configured correctly.In a video interview with ZDNet Australia on Thursday, Dr Jan Hruska, who co-founded Sophos and was one of the first ever PC antivirus experts, said that viruses on the Mac are here and now.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
If you're a penny-pincher, the free version of Ad-aware 6.0 is a good choice for spyware protection.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.