Malware virus Trojan and spyware protection and removal
- February 07, 2011
Attackers are becoming more skilled at harvesting the amount of bandwidth available and selecting specific targets, a new report finds.
- February 03, 2011
Researchers at security firm, Last Line of Defense, have discovered a cache of hundreds of thousands of stolen email credentials and FTP passwords.
- January 27, 2011
The upstream provider serving hosting provider Volgahost shut down uploads from its servers, effectively cutting off botnet command and control servers from giving any orders.
- January 25, 2011
Cybercriminals are resorting to new sales tactics to remain viable in an increasingly competitive environment, according to a new report.
- January 20, 2011
The FBI said attackers are emailing malicious job applications to businesses that contain malware that steals banking credentials and wire transfers stolen money to the Ukraine.
- December 08, 2010
The TDL4 rootkit, a variant of the Alureon rootkit, has been updated to target a zero-day vulnerability in the Windows Task Scheduler.
- December 03, 2010
A new variant of malware associated with the Zeus Trojan will double the work for those trying to block it
- December 02, 2010
The cybercriminals behind the Siberia Exploits Kit have given it an update, brining it in line with competitor toolkits by adding features to bypass antivirus.
- November 23, 2010
The start of the holiday season is ripe with SEO poisoning, third-party attack ads and spam messages touting deals that are too good to be true, according to security experts.
- November 19, 2010
The Ares Trojan -- for sale via anonymous online money transfer --is being propagated by its unidentified developer as customizable to each of its buyers.
- November 09, 2010
Traditional malware analysis can not keep up with new malware, said noted malware expert Greg Hoglund, founder of HBGary Inc. Hoglund is pushing for new defense techniques.
- October 27, 2010
A member of Google's antimalware team revealed how the search engine giant combs billions of webpages for hidden malware downloads.
- October 26, 2010
Police took over the command-and-control servers responsible for sending orders to Bredolab, a notorious spam botnet known for spreading rogue antivirus programs.
- October 21, 2010
The Georgia Tech Information Security Center Emerging Cyber Threats Report outlines the increasing sophistication of botnets, mobile attacks and related cybersecurity issues.
- October 19, 2010
Botnets are a pivotal part of the global cybercrime problem and must be fought with collective defense actions, according to Microsoft's latest Security Intelligence Report.