Malware virus Trojan and spyware protection and removal
- September 30, 2010
The Stuxnet Trojan remains a threat to a small group of critical infrastructure facilities, but experts say future malware writers may attempt to copy its processes.
- September 22, 2010
Attacks against the browser and its components would be isolated from the desktop and the network in a virtual environment.
- August 31, 2010
Despite an effort by ISPs and security research teams to cripple the botnet, follow-up analysis finds it recovering its strength with new command and control servers.
- August 11, 2010
Security researchers who develop signatures to detect malware and other insidious software are finding themselves increasingly under attack, according to Vitaly Kamluk, Kaspersky Lab's chief security expert based in Japan. Kaspersky is currently in ...
- July 28, 2010
Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings.
- July 01, 2010
Get updates on the latest happenings at the Black Hat 2010 conference with breaking news stories, and exclusive video and podcasts.
- June 22, 2010
Botnets will be a major problem for at least the next two years and key cloud computing and virtualization security decisions could determine the outcome of future attacks.
- June 17, 2010
Botnets are growing and security research teams are virtually powerless to do anything about it.
- June 03, 2010
Security researchers at antivirus vendor Intego have discovered spyware attached to freely downloadable Mac applications. The malware is difficult to detect.
- May 25, 2010
Security experts say the potential of the attack shouldn't strike fear at enterprises. Enterprise CISOs should place their focus on other priorities.
- May 20, 2010
3FN.net had its operations permanently halted this week. The rogue ISP was hosting botnet command and control servers, child pornography and malware.
- May 17, 2010
A new tool simplifies the process of using Twitter for command and control, but experts doubt its viability. Still, attackers are using social networks to send out orders to bots.
- May 10, 2010
Email deceives users into opening a zipped file attachment by faking a Microsoft Upgrade Advisor. Instead, victims receive password stealing malware and other malicious files.
- April 29, 2010
Latest variant emerges with a few tweaks and could be stealthier on corporate networks, but researchers studying its code base have found the same earlier flaws that weaken it.
- April 01, 2010
The recent arrests of those suspected of being connected to the Mariposa botnet and the legal action by Microsoft to take down the command and control of the Waledac botnet may be a sign that those defending the Internet are gaining ground against ...