Blog Posts Tagged with "virus"
Sophos is the Lamest Virus Ever...
September 21, 2012 Added by:Damion Waltermeyer
Starting September 19, Sophos successfully became the lamest virus ever. An update put out by their auto-update service has rendered many machines across the world useless. This update detected false positives and deleted or quarantined them...
Comments (0)
Tackling Modern Malware
August 15, 2012 Added by:Simon Heron
With conventional antivirus products, their signature bases are never completely up to date. When a new infection emerges, it simply roams freely across all endpoints. Conversely, WSA leverages behavioural monitoring to pick up infections when it isn’t sure whether a file is malicious or not...
Comments (0)
How Hacking Can Kill
July 09, 2012 Added by:Edward Jones
Wherever you are on the internet, there’s often a virus lurking around the digital corner. A hacker will always find a new way of getting your data - and turning it into money. And as we found-out last year, hacking has progressed from threatening our data security to potentially threatening our lives...
Comments (1)
Seventeen Percent of PCs Are Overtly Exposed
June 21, 2012 Added by:Robert Siciliano
If you are part of the 17% without security software installed, listen up: there are millions of viruses out there that will ravage your PC to death. Some can make your PC completely inoperable, while others allow criminals to control your PC remotely, making it part of a botnet, used for nefarious ends...
Comments (0)
Kaspersky's Problematic Flame Analysis
May 29, 2012 Added by:Jeffrey Carr
I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...
Comments (0)
Flame Trojan Ignites Cyberwar Chatter
May 29, 2012 Added by:Headlines
"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."
Comments (0)
New Study Published on Mobile Malware
May 23, 2012 Added by:Beau Woods
Two malware families show that authors have incorporated many sophisticated features to help circumvent detection and frustrate researchers attempting to study the samples, among other things. And their analysis showed that mobile malware is rapidly maturing...
Comments (0)
Malware Threats: Save Your Company Now
May 21, 2012 Added by:Bill Gerneglia
As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...
Comments (0)
Busting the Ten Biggest Computer Security Myths
May 08, 2012 Added by:Headlines
While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...
Comments (1)
Trojans Dominate New Malware Development Sampled
May 07, 2012 Added by:Headlines
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...
Comments (0)
Checking Your System for the DNS Changer Malware
April 23, 2012 Added by:Headlines
The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...
Comments (0)
Backdoor.Flashback Mac Virus Patch and Removal Tools
April 10, 2012 Added by:Headlines
Last week Doctor Web, found that the Flashback Mac Trojan has infected almost 600,000 systems, and has created an online tool to check to see if your machine is infected. F-Secure has released instructions on how to remove the virus if you are indeed infected...
Comments (0)
Duqu Cyber Weapons Factory Still Operating
March 29, 2012 Added by:Plagiarist Paganini
I graphed the data supplied by leading teams involved in research on Duqu. Does the fact that the majority of instances have been identified in Sudan and Iran suggest something? Have you still doubts about who may have developed this powerful family of cyber weapons?
Comments (0)
How QR Codes Can Deliver Malware
March 28, 2012 Added by:Robert Siciliano
QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus...
Comments (0)
The FBI Can Haz Lulz Too...
March 15, 2012 Added by:Kevin McAleavey
Since Sabu's arrest a number of spurious lulz cannon tools have been interspersed in tweets, including the infamous LOIC, others containing added "call home" code, and some virused booty culminating in the latest release of "Anonymous OS" which is wrapped in trojans...
Comments (1)
Seventy-Five Million Unique Malware Samples in 2012
February 08, 2012 Added by:Robert Siciliano
Imagine your body being targeted by 75 million viruses. That is exactly what’s happening to your digital devices. Laptops, desktops, netbooks, notebooks, Macs, iPads, iPhones, BlackBerrys, Androids, and Symbian mobile phones are all being targeted...
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps