Malware virus Trojan and spyware protection and removal
- August 17, 2012
The Microsoft Malicious Software Removal Tool release warns users of Win32/Bafruz family backdoor Trojan.
- August 09, 2012
Kaspersky Lab has exposed a new cyberespionage toolkit it says is used in nation-state-sponsored attacks targeting people in the Middle East.
- July 30, 2012
A new defensive technique that can be used in Intel-based processors could thwart memory-based return oriented programming attacks.
- July 26, 2012
Thursday's Apple tech talk marked its first public discussion about iOS security, but only covered what security researchers already know.
- July 25, 2012
Mac security vendor Intego identified the Crisis Trojan, a new Mac OSX Trojan, as a likely future weapon for targeted attacks against Apple endpoints.
- July 20, 2012
Malware is increasingly difficult to detect and analyze, experts say. Researchers will explore potential attack vectors and emerging analysis tools.
- July 18, 2012
The Mahdi Trojan contains a keylogger that can record a victim's keystrokes and upload the data to a remote server.
- July 17, 2012
Attack toolkits have grown in sophistication as cybercriminals add better code obfuscation and other techniques to avoid detection and improve attack effectiveness.
- July 09, 2012
DNSChanger infections have declined precipitously, but remaining systems could have Internet access turned off today.
- July 02, 2012
Having skilled IT pros closely monitoring intrusion prevention systems to investigate network traffic anomalies can reduce infections, experts say.
- June 25, 2012
The Flame malware, believed to be a joint U.S.-Israeli project, shows stark differences between the tactics used by China and those used by the West.
- June 20, 2012
Malicious sites discovered via Google’s Safe Browsing effort include compromised websites and others designed for malware distribution or phishing.
- May 30, 2012
Flame, a package of components commonly available in most banking Trojans and remote access toolkits, is detectable by current antivirus, experts say.
- April 25, 2012
The Black Hole Exploit toolkit is behind the bulk of the HTML and Java exploits, according to version 12 of the Microsoft Security Intelligence Report.
- March 01, 2012
RSA Conference 2012 panelists discussed court rulings on liability for hacked bank accounts, and gave advice to security pros for protecting financial assets.