Malware virus Trojan and spyware protection and removal
- November 23, 2010
The start of the holiday season is ripe with SEO poisoning, third-party attack ads and spam messages touting deals that are too good to be true, according to security experts.
- November 19, 2010
The Ares Trojan -- for sale via anonymous online money transfer --is being propagated by its unidentified developer as customizable to each of its buyers.
- November 09, 2010
Traditional malware analysis can not keep up with new malware, said noted malware expert Greg Hoglund, founder of HBGary Inc. Hoglund is pushing for new defense techniques.
- October 27, 2010
A member of Google's antimalware team revealed how the search engine giant combs billions of webpages for hidden malware downloads.
- October 26, 2010
Police took over the command-and-control servers responsible for sending orders to Bredolab, a notorious spam botnet known for spreading rogue antivirus programs.
- October 21, 2010
The Georgia Tech Information Security Center Emerging Cyber Threats Report outlines the increasing sophistication of botnets, mobile attacks and related cybersecurity issues.
- October 19, 2010
Botnets are a pivotal part of the global cybercrime problem and must be fought with collective defense actions, according to Microsoft's latest Security Intelligence Report.
- October 06, 2010
The Stuxnet malware has highlighted the need for software with fewer defects and is an "indictment on the IT business in general," according to the security chief at NERC.
- September 30, 2010
The Stuxnet Trojan remains a threat to a small group of critical infrastructure facilities, but experts say future malware writers may attempt to copy its processes.
- September 22, 2010
Attacks against the browser and its components would be isolated from the desktop and the network in a virtual environment.
- August 31, 2010
Despite an effort by ISPs and security research teams to cripple the botnet, follow-up analysis finds it recovering its strength with new command and control servers.
- August 11, 2010
Security researchers who develop signatures to detect malware and other insidious software are finding themselves increasingly under attack, according to Vitaly Kamluk, Kaspersky Lab's chief security expert based in Japan. Kaspersky is currently in ...
- July 28, 2010
Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings.
- July 01, 2010
Get updates on the latest happenings at the Black Hat 2010 conference with breaking news stories, and exclusive video and podcasts.
- June 22, 2010
Botnets will be a major problem for at least the next two years and key cloud computing and virtualization security decisions could determine the outcome of future attacks.