Malware virus Trojan and spyware protection and removal
- August 07, 2013
FortiGuard Labs reports a 30% increase in mobile malware so far in 2013, and cautions ransomware is also making an appearance on mobile devices.
- August 01, 2013
In his keynote at Black Hat 2013, Gen. Keith Alexander said NSA surveillance programs have strict oversight, despite many inaccurate media reports.
- July 24, 2013
RSA is warning that a new banking Trojan, 'KINS,' with architectural similarities to previous Trojans, may start hitting PCs soon.
- July 22, 2013
Jerome Segura of Malwarebytes explains how to get around 'FBI ransomware' computer locking.
- July 09, 2013
Damballa executives say partnerships among security point product vendors are increasingly important, and will ultimately benefit enterprises.
- May 09, 2013
Microsoft released a temporary fix to mitigate attacks using the most recent Internet Explorer 8 zero day vulnerability.
- April 22, 2013
Verizon's 2013 breach report shows most breaches are caused by a select few attack types, and the majority of breaches aren't detected for months.
- March 04, 2013
Tillmann Werner of CrowdStrike wowed onlookers with a live 'sinkholing' demonstration, taking down the Kelihos P2P botnet.
- February 27, 2013
Chinese cyberattacks rely on spear phishing and overwhelming numbers, not sophisticated attack methods, says a researcher at RSA Conference 2013.
- January 23, 2013
The recent Red October attacks show not only a new level of complexity, but an ongoing problem with attack attribution.
- December 27, 2012
Proof-of-concept code targets Microsoft Dynamics Great Plains platform and can enable an attacker to transfer funds to accounts of their choosing.
- December 17, 2012
Symantec has confirmed the existence of the targeted Trojan it calls Batchwiper.
- December 14, 2012
A Trojan horse waits for a left mouse click to execute each step of the infection process, according to new research from FireEye Inc.
- December 13, 2012
Malware attacks were the most prominent in the retail and financial services industries in 2012.
- December 05, 2012
The cybercriminals connected to the notorious Zeus Trojan are using the Cutwail botnet to distribute spam designed to steal account credentials.