Malware, Viruses, Trojans and Spyware

Malware, Viruses, Trojans and Spyware News

  • October 21, 2014 21 Oct'14

    Suspected Staples breach under investigation

    The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.

  • October 03, 2014 03 Oct'14

    Palo Alto NGFW fails NSS Labs report, war of words ensues

    News roundup: Palo Alto's next-generation firewall fared poorly in a recent NSS Labs report, leading to a testy back-and-forth about NGFW testing. Plus: Mitnick selling zero days; EMET bypassed, again; iThemes stored plaintext passwords.

  • October 01, 2014 01 Oct'14

    Zeus malware is back with a new target: Mobile devices

    Zeus malware is back with a new target -- mobile devices. Expert Nick Lewis explains how Zeus-in-the-mobile differs from traditional Zeus and how to defend against it.

  • September 29, 2014 29 Sep'14

    Malvertising problem to worsen as attacks become more sophisticated

    Malvertising is already being used by attackers as a delivery mechanism for exploit kits, and new research reveals the problem is likely to get worse, specifically in the form of malicious Flash banners.

View All News

Malware, Viruses, Trojans and Spyware Get Started

Bring yourself up to speed with our introductory content

  • Mitigating mobile and PC malware hybrid threats

    Hybrid threats are becoming an increasing issue for mobile devices. Enterprise threats expert Nick Lewis explains how to mitigate the risk. Continue Reading

  • canvas fingerprinting (CPF)

    Canvas fingerprinting (CPF) is a surreptitious online user tracking technique that relies on minute differences in text or images drawn on command by users’ browsers. This definition of canvas fingerprinting explains what it is, how it works, and ... Continue Reading

  • equipment destruction attack

    An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled simply as a result of physical access to the computer... Continue Reading

View All Get Started

Evaluate Malware, Viruses, Trojans and Spyware Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Malware, Viruses, Trojans and Spyware

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Malware, Viruses, Trojans and Spyware Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close