Blog Posts Tagged with "virus"

Ca77c9128684f4263450c6d728107608

Sophos is the Lamest Virus Ever...

September 21, 2012 Added by:Damion Waltermeyer

Starting September 19, Sophos successfully became the lamest virus ever. An update put out by their auto-update service has rendered many machines across the world useless. This update detected false positives and deleted or quarantined them...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Tackling Modern Malware

August 15, 2012 Added by:Simon Heron

With conventional antivirus products, their signature bases are never completely up to date. When a new infection emerges, it simply roams freely across all endpoints. Conversely, WSA leverages behavioural monitoring to pick up infections when it isn’t sure whether a file is malicious or not...

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

How Hacking Can Kill

July 09, 2012 Added by:Edward Jones

Wherever you are on the internet, there’s often a virus lurking around the digital corner. A hacker will always find a new way of getting your data - and turning it into money. And as we found-out last year, hacking has progressed from threatening our data security to potentially threatening our lives...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Seventeen Percent of PCs Are Overtly Exposed

June 21, 2012 Added by:Robert Siciliano

If you are part of the 17% without security software installed, listen up: there are millions of viruses out there that will ravage your PC to death. Some can make your PC completely inoperable, while others allow criminals to control your PC remotely, making it part of a botnet, used for nefarious ends...

Comments  (0)

296634767383f056e82787fcb3b94864

Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

New Study Published on Mobile Malware

May 23, 2012 Added by:Beau Woods

Two malware families show that authors have incorporated many sophisticated features to help circumvent detection and frustrate researchers attempting to study the samples, among other things. And their analysis showed that mobile malware is rapidly maturing...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Malware Threats: Save Your Company Now

May 21, 2012 Added by:Bill Gerneglia

As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Busting the Ten Biggest Computer Security Myths

May 08, 2012 Added by:Headlines

While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Trojans Dominate New Malware Development Sampled

May 07, 2012 Added by:Headlines

In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Checking Your System for the DNS Changer Malware

April 23, 2012 Added by:Headlines

The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Backdoor.Flashback Mac Virus Patch and Removal Tools

April 10, 2012 Added by:Headlines

Last week Doctor Web, found that the Flashback Mac Trojan has infected almost 600,000 systems, and has created an online tool to check to see if your machine is infected. F-Secure has released instructions on how to remove the virus if you are indeed infected...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Duqu Cyber Weapons Factory Still Operating

March 29, 2012 Added by:Pierluigi Paganini

I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?

Comments  (0)

37d5f81e2277051bc17116221040d51c

How QR Codes Can Deliver Malware

March 28, 2012 Added by:Robert Siciliano

QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The FBI Can Haz Lulz Too...

March 15, 2012 Added by:Kevin McAleavey

Since Sabu's arrest a number of spurious lulz cannon tools have been interspersed in tweets, including the infamous LOIC, others containing added "call home" code, and some virused booty culminating in the latest release of "Anonymous OS" which is wrapped in trojans...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Seventy-Five Million Unique Malware Samples in 2012

February 08, 2012 Added by:Robert Siciliano

Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »