Malware virus Trojan and spyware protection and removal
- August 11, 2014
A new site gives remaining victims of the CryptoLocker ransomware the private keys needed to decrypt and recover locked files.
- August 04, 2014
The file-less 'Poweliks' malware incorporates a unique combination of antivirus evasion techniques involving the Windows registry to remain undetected on victims' machines.
- August 01, 2014
The U.S. government has divulged details on the 'Backoff' point-of-sale malware campaign, which purportedly targets remote access software for entry.
- July 29, 2014
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
- July 25, 2014
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
- July 24, 2014
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
- June 10, 2014
CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.
- May 13, 2014
Security flaws in protocols such as NTLM are so easy to exploit that in many cases attackers no longer need the latest and greatest malware.
- April 11, 2014
FireEye and Palo Alto Networks take issue with the new NSS Labs report on breach-detection systems, calling the review process into question.
- March 20, 2014
Spotting unusual network traffic, like large amounts of encrypted data headed to suspicious domains, is key to better banking botnet detection.
- February 27, 2014
At the inaugural TrustyCon event, F-Secure's Mikko Hypponen decried the lack of trust in security vendors like RSA and warned of government malware.
- February 03, 2014
What is mobile malware? HP says detection rates among mobile AV vendors vary greatly as experts struggle to define malicious activity in apps.
- January 14, 2014
A report from NSS Labs details the latest updates to financial malware, with criminal crews focused on hiding communications, localization.
- November 26, 2013
The CrytoLocker ransomware pulls off the usual tricks associated with the attack genre, but one expert says its professional execution sets it apart.
- November 21, 2013
A recent blog report from security vendor FireEye suggests that advanced threats are turning toward in-memory tactics.