Articles about Malware
A collection of notable security news items for the week ending December 19, 2014. Covers enterprise, controversies, reports and more.
A new strain of the malevolent ZeuS malware has been discovered targeting over 150 banks and 20 payment systems across the globe.
Google has blacklisted over 11,000 domains after a malware campaign, dubbed SoakSoak, compromised more than 100,000 websites using the WordPress content management system.
What services and events are predicted to shape malware, security and corporations next year?
In the country dubbed the 'Hermit Kingdom,' just how does the cyber elite operate?
Sylvester Stallone is unlikely to be happy about the latest developments in the Sony catastrophe.
The US agency has warned US businesses to stay alert due to the discovery of some particularly nasty malware in the wild -- while North Korea refuses to deny involvement.
The ruling marks the first-ever criminal conviction concerning the advertisement and sale of mobile device spyware applications.
A collection of notable security news items for the week ending November 28, 2014. Covers enterprise, controversies, reports and more.
Opinion: As 2014 comes to a close, bugs are increasingly disclosed with catchy names and logos. Heartbleed's branding changed the way we talk about security, but is making a bug 'cool' frivolous or essential?
Europe's law enforcement agency has cracked down on the use of remote access trojans.
A collection of notable security news items for the week ending November 21, 2014. Covers enterprise, controversies, reports and more.
The malware variant also has its eye on online commerce, transaction authentication software
The top security threats of 2014 include equal parts old mistakes, new adversaries, innocent human nature and the evils that people do.
A collection of notable security news items for the week ending November 14, 2014. Covers enterprise, controversies, reports and more.
What scams and schemes do you need to watch out for during the holiday season?
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime.
On the fifth day of Christmas, my true love gave to me, an app which stole my identity.
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.
They don't make malware like they used to. Literally.Back in 2002, Microsoft and its customers were forced to deal with an unprecedented outbreak of attacks on Windows that threatened the company's survival. In this gallery, I show how malware authors and Microsoft's security response have evolved over the past decade.
It's been almost 25 years since the first PC computer virus left users looking at corrupted floppies, lost work and perplexing messages. In that time, the art of automated malfeasance has progressed to the point that it's part of the armoury of international geopolitics.
One of the great myths of security is that if your PC is infected with malware it’s your own fault. You shouldn’t have been searching for porn, downloading pirated software, or snagging bootleg DVDs from BitTorrent.But that's no longer true. These days, even ads on a legitimate web page can lead to unwanted, potentially malicious software. Here's an example.
In May 2011, Apple issued its first-ever security update designed to remove malware on Macs. Has Apple's response to Mac Defender been good enough for its customers? And is Apple prepared for the next attack? This gallery shows what Apple has done with Security Update 2011-003.
Want proof that the bad guys are starting to target Mac users? Take a look at this series of screens, which show an attempt to convince a user to install a fake antivirus program that has a nasty payload
If you think switching to Google Chrome will protect you from socially engineered malware attacks, think again.
The fallout from the data breach of US marketing firm Epsilon was massive. Some of the world's largest companies were forced to apologise, as customer details stored within Epsilon were stolen by hackers.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
At the RSA Conference in San Francisco, Symantec CEO Enrique Salem reveals what he thinks the security of the future will look like. Among the things he says we need to do? Make security risk-based, info-centric, automated, and work-flow driven to keep up with security threats.
Sponsored: There's no shortage of malicious code on the Internet. Agent Peterson of the Geek Squad offers some tips on how to protect yourself from viruses and spyware.The content for this video was sponsored and provided by Geek Squad.
The co-founder of antivirus firm Sophos said that the Apple Mac is not a virus-free platform; he also believes that Windows can be as secure as Linux -- if it is configured correctly.In a video interview with ZDNet Australia on Thursday, Dr Jan Hruska, who co-founded Sophos and was one of the first ever PC antivirus experts, said that viruses on the Mac are here and now.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
If you're a penny-pincher, the free version of Ad-aware 6.0 is a good choice for spyware protection.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.