Blog Posts Tagged with "virus"

A88973e7d0943d295c99820ab9aeed27

Four Fold Increase in eMail-Based Malware

March 19, 2011 Added by:Simon Heron

This increased activity is probably caused by botnet herders attempting to increase the size of their botnets, and this will probably be followed by a corresponding increase in spam levels. It might be that the recent decline in Spam may be reversed...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Dispelling Myths about Apple Products and Viruses

February 28, 2011 Added by:Theresa Payton

The myth that Apple products are impervious to viruses is almost like a virus in and of itself. Only instead of infecting Apple products, it is infecting the way Apple users think about the product. This “myth” continues to mislead Apple users into believing they are safe from viruses...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Thirty Percent of EU Internet Users Affected by Worm in 2010

February 26, 2011 Added by:Bill Gerneglia

These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nearly Twenty Million New Malware Threats in 2010

January 31, 2011 Added by:Headlines

Almost twenty million new malware threats were identified in 2010, according to research by IT lab AV-Test. The number is more than fifty percent greater than those identified in 2009, and the trend shows an increase in the prevalence of unique malware samples over the last ten years...

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

Security Threats: Face the Danger

January 13, 2011 Added by:Roman Zeltser

Many professionals have revised the entire approach to security. The common denominator for all opinions is the fact that our commonly accepted approach to IT security is not working anymore due to the new and highly sophisticated penetration tools that were developed recently...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Virus Runs Rampant at Iranian Nuclear Facilities

December 15, 2010 Added by:Headlines

The highly sophisticated Stuxnet virus is running rampant at Iranian nuclear facilities. Researchers are basing their assessment of the level of infestation on the sharp and continued increase in internet traffic from Iran to websites dedicated to eradicating the virus...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ten Biggest Hacking Exploits in Twenty-Five Years

December 15, 2010 Added by:Headlines

In the wake of the recent WikiLeaks and Gawker episodes, Brian Ries has compiled a list of the the 10 most destructive attacks of the last 25 years. From data theft to DDoS, worms to scams, Ries has assembled a pretty darn good survey of the best of the worst cyber miscreants have had to offer...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher: Stuxnet Virus Probably "Made In China"

December 14, 2010 Added by:Headlines

Security expert Jeffrey Carr of Taia Global, who had previously proposed alternatives to the notion that the United States or Israel created the Stuxnet virus to target Iranian centrifuges, now strongly believes her has uncovered data that indicates the malware originated in China...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Changes in Crimeware You Can Count On

November 28, 2010 Added by:Brent Huston

The capability and dependence on crimeware as an attack model is growing. The attacks from the next generations will have a much longer tail and will come in a series of waves and lulls, making detection more difficult and extending the time window of control for the attackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Virus is an Example of Cyber Warfare

November 28, 2010 Added by:Headlines

Stuxnet is the first in-the-wild evidence of what the future of cyber offensives may look like. So instead of the Israeli air force bombing facilities, we have covert malware infesting critical systems to slow Iran's nuclear weapons ambitions. This is cyber warfare...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Five Facebook Applications Contain Malware

November 24, 2010 Added by:Headlines

An examination of 14,000 Facebook user accounts found that 20% have applications that contain malware capable of infecting those who click on the links with a virus or other malicious code. The study was based on data collected over the last month...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Developed to Halt Iran's Uranium Enrichment

November 15, 2010 Added by:Headlines

Researchers from Symantec have concluded that Stuxnet was designed to interfere with the performance of high-speed electric motors, the types which would be required to operate the gas centrifuges used in the refinement process...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Stuxnet Targeting Specific SCADA Configurations

November 04, 2010 Added by:Danny Lieberman

The target is not the SCADA system itself but rather the Siemens WinCC visualization and process monitoring software – WinCC which runs on standard Windows platforms as I pointed out in a previous post, and not on a hardened version of Windows as Shai Blitzblau seems to think...

Comments  (0)

43559f6a0465c923b496a260211995c0

How Many Aunt Sally Years Does Your Network Have?

October 29, 2010 Added by:Pascal Longpre

Thousands of strategic systems have been infected with the Stuxnet worm. Are all of them poorly managed corporate systems? I doubt it. But malware keeps getting past protection mostly because of end user behavior. Is your network differently or better protected? Probably not...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seven Ways to Combat Scareware

October 28, 2010 Added by:Robert Siciliano

What makes the scam so believable is there is actual follow through of the purchasing of software that is supposed to protect you. There is a shopping cart, an order form, credit card processing and a download, just like any online software purchase...

Comments  (5)

A88973e7d0943d295c99820ab9aeed27

U.S. Dominates September Virus Threat Stats

September 29, 2010 Added by:Simon Heron

September internet threat stats indicate the virus threat landscape has shifted again. This highlights the fluidity of malware producers and once more emphasizes the need for an international solution to be developed to tackle the persistent and ever-changing problem of cybercrime...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »