Articles about Malware
A zero-day vulnerability affecting popular hotel Internet gateways has been discovered and closed.
A collection of notable security news items for the week ending March 26, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Could drafting in specialist training prevent company employees from falling for phishing campaigns?
The two companies are combining their portfolios to better protect the enterprise against DDoS attacks.
A vulnerability in the Android PackageInstaller system allowed attackers to hijack the installation process of a seemingly safe third-party Android app and replace it with one infected with malware.
The FBI is investigating whether the data has stemmed from public records or cyberattack.
Known vulnerability CVE-2011-2461, despite being patched, remains a threat to today's websites which host exploitable Flash movies.
A collection of notable security news items for the week ending March 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The plugin's security problem could be exploited to allow remote attackers to conduct arbitrary server-side code execution.
The former FireEye executive will lead the company in developing ways to combat APTs, Zero days and new, advanced threats.
The marketplace, used to sell everything from drugs to hacking services, has disappeared without a trace.
Researchers from FireEye claim the security risks posed by the FREAK flaw are far from over.
According to IBM, roughly one billion personal records were leaked in 2014 due to online threats and cyberattacks.
A security expert has warned that stolen data is being sold back into legitimate commercial channels.
A new strain of the CryptoLocker ransomware is targeting gamers through online games and services, including Minecraft, World of Warcraft and the Steam platform.
What are phishing campaigns, why do they exist and how do I protect myself?
What is malware, what does it do and how do I protect myself?
It's nasty, but you don't have to be held to ransom by it.
What scams and schemes do you need to watch out for during the holiday season?
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime.
On the fifth day of Christmas, my true love gave to me, an app which stole my identity.
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.
They don't make malware like they used to. Literally.Back in 2002, Microsoft and its customers were forced to deal with an unprecedented outbreak of attacks on Windows that threatened the company's survival. In this gallery, I show how malware authors and Microsoft's security response have evolved over the past decade.
It's been almost 25 years since the first PC computer virus left users looking at corrupted floppies, lost work and perplexing messages. In that time, the art of automated malfeasance has progressed to the point that it's part of the armoury of international geopolitics.
One of the great myths of security is that if your PC is infected with malware it’s your own fault. You shouldn’t have been searching for porn, downloading pirated software, or snagging bootleg DVDs from BitTorrent.But that's no longer true. These days, even ads on a legitimate web page can lead to unwanted, potentially malicious software. Here's an example.
In May 2011, Apple issued its first-ever security update designed to remove malware on Macs. Has Apple's response to Mac Defender been good enough for its customers? And is Apple prepared for the next attack? This gallery shows what Apple has done with Security Update 2011-003.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
At the RSA Conference in San Francisco, Symantec CEO Enrique Salem reveals what he thinks the security of the future will look like. Among the things he says we need to do? Make security risk-based, info-centric, automated, and work-flow driven to keep up with security threats.
Sponsored: There's no shortage of malicious code on the Internet. Agent Peterson of the Geek Squad offers some tips on how to protect yourself from viruses and spyware.The content for this video was sponsored and provided by Geek Squad.
The co-founder of antivirus firm Sophos said that the Apple Mac is not a virus-free platform; he also believes that Windows can be as secure as Linux -- if it is configured correctly.In a video interview with ZDNet Australia on Thursday, Dr Jan Hruska, who co-founded Sophos and was one of the first ever PC antivirus experts, said that viruses on the Mac are here and now.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
If you're a penny-pincher, the free version of Ad-aware 6.0 is a good choice for spyware protection.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.