Malware virus Trojan and spyware protection and removal
- September 20, 2011
A top NSA cybersecurity official says the growing cybersecurity threat landscape requires that good guys think like attackers.
- September 08, 2011
Cybercriminals are increasingly targeting Android devices with crimeware that is actively communicating with multiple criminal command-and-control servers.
- August 29, 2011
Security firms say the Morto worm isn’t a Trojan, but an Internet worm that spreads via Windows Remote Desktop Protocol (RDP).
- August 16, 2011
The SpyEye source code could enable researchers better understand the malware, but it could also make SpyEye a much larger malware threat, according to Damballa Inc.
- August 03, 2011
Android devices are now more than twice as likely to be hit with malware, thanks to new techniques exploiting numerous Android security issues.
- July 21, 2011
The new malware alert feature is in response to unusual search traffic detected in the search engine giant’s servers.
- July 18, 2011
Independent testing firm NSS Labs found that Internet Explorer 8 and 9 have better social engineering blocking technology, exceeding the Chrome, Firefox or Safari browsers.
- June 20, 2011
Researchers detected a drive-by attack contained in malicious code hosted on a compromised restaurant website.
- May 02, 2011
A security team at CSIS Security Group discovered a crimeware toolkit targeting Mac OS X being sold on the black market. Researchers are also noting an increase in fake antivirus.
- April 28, 2011
The out-of-band update can detect botnet infections and continue to cripple the notorious Coreflood botnet.
- April 04, 2011
Two waves of email attacks targeted small groups of RSA employees, the company said in a blog post last week revealing the first details of the attack since the breach was announced March 22.
- March 28, 2011
Attack enabled hackers to gain access to various databases containing account credentials associated with the website.
- March 17, 2011
A dangerous vulnerability affecting the BlackBerry browser can be used to gain access to sensitive data or steal the phone's contact list and image database.
- March 09, 2011
The non-profit white hat website, abuse.ch, attempts to detect and list malicious IP addresses hosting botnet command-and-control servers. But its success has put it in the crosshairs of cybercriminals.
- March 08, 2011
The search engine giant said it would take steps to prevent additional malicious applications from using similar exploits from being distrusted via its Android Market.