Malware virus Trojan and spyware protection and removal
- May 02, 2011
A security team at CSIS Security Group discovered a crimeware toolkit targeting Mac OS X being sold on the black market. Researchers are also noting an increase in fake antivirus.
- April 28, 2011
The out-of-band update can detect botnet infections and continue to cripple the notorious Coreflood botnet.
- April 04, 2011
Two waves of email attacks targeted small groups of RSA employees, the company said in a blog post last week revealing the first details of the attack since the breach was announced March 22.
- March 28, 2011
Attack enabled hackers to gain access to various databases containing account credentials associated with the website.
- March 17, 2011
A dangerous vulnerability affecting the BlackBerry browser can be used to gain access to sensitive data or steal the phone's contact list and image database.
- March 09, 2011
The non-profit white hat website, abuse.ch, attempts to detect and list malicious IP addresses hosting botnet command-and-control servers. But its success has put it in the crosshairs of cybercriminals.
- March 08, 2011
The search engine giant said it would take steps to prevent additional malicious applications from using similar exploits from being distrusted via its Android Market.
- March 07, 2011
While Google gained greater control over malware poisoned search results, cybercriminals turned to other search engines and took advantage of opportunities on social networks.
- March 02, 2011
Tatanarg combines a man-in-the-browser attack with the capability of detecting and disabling Zeus on an infected system.
- March 01, 2011
Security researchers have discovered a new mobile malware hidden in apps on unregulated third-party Android marketplaces.
- March 01, 2011
Security luminary Bruce Schneier said Stuxnet has introduced a new spate of public questions about covert operations carried out with malware and USB sticks, rather than warships and missiles.
- February 22, 2011
Security researchers at Trusteer warn that a new Trojan uses session ID tokens to keep banking sessions open long after customers think they have logged off.
- February 17, 2011
A panel at RSA 2011 explains the organization and methodology behind targeted persistent attacks and what organizations can do to detect and respond to APT.
- February 10, 2011
Using social engineering techniques and spear-phishing attacks, attackers are exploiting Windows flaws and using tools to steal sensitive proprietary data, including project-financing information.
- February 07, 2011
Attackers are becoming more skilled at harvesting the amount of bandwidth available and selecting specific targets, a new report finds.