Articles about Malware
The sheer number of alerts that security folk have to go through means they are playing a game that they will eventually lose.
A collection of notable security news items for the week ending February 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Researchers say they have identified malware which aims to steal data from iOS devices as part of a targeted attack.
Sony's Amy Pascal has resigned as co-chair of the company following a disastrous cyberattack which cost the company dearly both financially and in reputation.
Anthem's hack and issues around organization accountability with PII is cause to protect ourselves from identity theft and more, including security freeze, fraud alert, and account recovery.
The region, first known as a computer virus factory, has since became one of the most advanced security hubs in the world, housing companies like Kaspersky, Bitdefender, and ESET. This is how it happened.
A security researcher disclosed Monday over 99 percent of About.com's topic links and domains are vulnerable to open XSS and Iframe Injection (XFS) attacks.
A collection of notable security news items for the week ending January 30, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Security firm Kaspersky claims Regin is strikingly similar to QWERTY malware documented in Snowden files.
New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws.
What factors does the enterprise need to consider when creating cybersecurity risk policies?
Hollywood's new cybersecurity film Blackhat opened this weekend and bombed hard, despite high praise from infosec elites.
Malware raises the cost of doing business by $1.3m a year, largely due to the burden of responding to false alarms, according to a survey.
Security news items for the week ending January 9, 2015. Covers enterprise, controversies, reports and more.
A deep-rooted malvertising campaign has wormed its way into a network of websites, potentially reaching 1.5 billion users.
This gallery offers an inside view of those "beneath the radar" botnets that never make the news. The images have been collected throughout the past year by using open source intelligence, namely, by either joining the command and control IRC channel upon infection, or monitoring ongoing communications between the botnet masters.If you ever wanted to take an inside view of targeted-botnets primarily run by novice cybercriminals sometimes utilizing outdated, but very effective methods - this gallery is for you.
Finally, you can run your antivirus at the gateway, thanks to the $330 IPCop/Copfilter firewall 25-watt appliance -- no gimmicks or hacks.
Here's a list of ten free security tools you can and should be using to help protect, disinfect and manage your Windows computer.
This gallery takes a look at Haute Secure, a new Internet Explorer add-on that promises to block drive-by exploits from compromising Windows computers.
Vista offers 800 new Group Policy settings, some that pertain to added features and others that enhance control over features carried over from Windows XP. Deb Shinder offers a detailed look at some of Vista's more interesting Group Policy additions: access to removable media, power management, and User Account Control policies.
Investigate the inner workings of your computer with Security Task Manager!
Computer Associates’ Internet Security Suite (ISS) collects four Internet security applications into a single, affordable suite. For approximately $40, small businesses receive the benefit of antivirus, antispam, antispyware and firewall programs.Boasting simple setup and effective protection, there’s a price to be paid when loading CA’s ISS. Plan on spending some time configuring its firewall application, and, as with many other Internet protection programs, expect slightly slower Web response times as the software works to protect systems from unwanted and potentially malicious e-mail and other infected programs.
Zobot and other worms and variants have hit networks since Sunday. A sketch shows which pests try to detect or undo rival pests, according to F-Secure.
Atilla Ekici is arrested in Turkey, under suspicion of having created both the Zotob and Mytob worms.
A phony copy of Google's Web site promises a $400 prize, and aims to steal users' personal information.
Fraudsters are using the holidays as a hook for phishing attacks.
Simply by visiting these sites using a vulnerable Windows PC could cause an infection, Websense says.
A discussion forum Web site for fans of Advanced Micro Devices chips was shut down Jan. 30 after the discovery of an exploit for Microsoft's Windows Meta File flaw.
Conference attendees flock to the San Jose McEnery Convention Center to hear the security industry's take on phishing, viruses and other threats.