Blog Posts Tagged with "Kaspersky"

69dafe8b58066478aea48f3d0f384820

Experts Debate Merits of McAfee's Shady Rat Report

August 30, 2011 Added by:Headlines

"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Q2 DDoS Attacks: Some Facts and Figures

August 29, 2011 Added by:Headlines

"Cybercriminals... are increasingly using DDoS attacks as a diversionary tactic when launching more sophisticated attacks such as those on online banking systems. Complex attacks of this nature are particularly damaging in that they can cause significant losses for the financial institutions..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Birth of the Antivirus Industry

July 11, 2011 Added by:Kevin McAleavey

The entire industry has been entirely sublimated by people who have no real idea of what the mission is and only count beans. And it shows in the quality of work performed by the numerous products across the board to the detriment of those paying them for a task that they're no longer up to...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Researchers Uncover 4.5 Million Device Super-Botnet

June 30, 2011 Added by:Headlines

“The development of TDSS will continue. Active reworkings of TDL-4 code, rootkits for 64-bit systems, the use of P2P technologies, proprietary anti-virus and much more make the TDSS malicious program one of the most technologically developed and most difficult to analyze..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TDSS Rootkit Boasts Self-Propagating Mechanisms

June 07, 2011 Added by:Headlines

"If the victim computer is located on a network using the DHCP protocol, the worm starts scanning the network to see if there are any available IP addresses. After that, the worm launches its own DHCP server and starts listening to the network..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Five Antivirus Programs for 2011

January 05, 2011 Added by:Headlines

Malware is consistently listed as one of the most serious threats to consumer and enterprise security. The results of this independent comparison conducted by security professionals provides those in the market for antivirus software a great starting point for making your selection...

Comments  (1)

Page « < 1 - 2 > »