Malware virus Trojan and spyware protection and removal
- July 09, 2012
DNSChanger infections have declined precipitously, but remaining systems could have Internet access turned off today.
- July 02, 2012
Having skilled IT pros closely monitoring intrusion prevention systems to investigate network traffic anomalies can reduce infections, experts say.
- June 25, 2012
The Flame malware, believed to be a joint U.S.-Israeli project, shows stark differences between the tactics used by China and those used by the West.
- June 20, 2012
Malicious sites discovered via Google’s Safe Browsing effort include compromised websites and others designed for malware distribution or phishing.
- May 30, 2012
Flame, a package of components commonly available in most banking Trojans and remote access toolkits, is detectable by current antivirus, experts say.
- April 25, 2012
The Black Hole Exploit toolkit is behind the bulk of the HTML and Java exploits, according to version 12 of the Microsoft Security Intelligence Report.
- March 01, 2012
RSA Conference 2012 panelists discussed court rulings on liability for hacked bank accounts, and gave advice to security pros for protecting financial assets.
- February 29, 2012
Security vendor FireEye announced File MPS, a new addition to their existing malware protection platform, at the RSA Conference 2012.
- January 31, 2012
The banking Trojan variant Cridex can break CAPTCHA tests in just a few attempts, allowing it to create malicious email accounts used for spamming and propagating the virus.
- January 30, 2012
Security firm M86 Security has discovered hundreds of WordPress websites compromised by Phoenix.
- January 27, 2012
Malicious webpages masquerading as browser updates are being used by attackers as launch pads for Trojan viruses and exploit kits.
- January 25, 2012
Microsoft has named a Russian programmer as the one who wrote the malicious Kelihos code used to create a small botnet that peddled spam and child pornography.
- January 24, 2012
The Black Hole crimeware kit has caused drive-by attacks to surge, according to the Sophos 2012 threat report.
- January 19, 2012
Attackers seize on the trust victim’s have in the social network by setting up a tricky man-in-the-browser attack and demanding $25 in cash.
- January 12, 2012
Phony Android application checks for running Carrier IQ software, but then sends SMS messages to a premium rate number.