Malware virus Trojan and spyware protection and removal
- June 03, 2010
Security researchers at antivirus vendor Intego have discovered spyware attached to freely downloadable Mac applications. The malware is difficult to detect.
- May 25, 2010
Security experts say the potential of the attack shouldn't strike fear at enterprises. Enterprise CISOs should place their focus on other priorities.
- May 20, 2010
3FN.net had its operations permanently halted this week. The rogue ISP was hosting botnet command and control servers, child pornography and malware.
- May 17, 2010
A new tool simplifies the process of using Twitter for command and control, but experts doubt its viability. Still, attackers are using social networks to send out orders to bots.
- May 10, 2010
Email deceives users into opening a zipped file attachment by faking a Microsoft Upgrade Advisor. Instead, victims receive password stealing malware and other malicious files.
- April 29, 2010
Latest variant emerges with a few tweaks and could be stealthier on corporate networks, but researchers studying its code base have found the same earlier flaws that weaken it.
- April 01, 2010
The recent arrests of those suspected of being connected to the Mariposa botnet and the legal action by Microsoft to take down the command and control of the Waledac botnet may be a sign that those defending the Internet are gaining ground against ...
- March 17, 2010
Internet service providers have the ability to wipe nearly all malicious activity in their networks without stepping on individual privacy and civil liberties, says network security expert Adam Rice of Tata Communications Ltd. Rice, chief security ...
- March 11, 2010
Despite a quarter of the Zeus command- and- control network being wiped out, security researchers observed a quick recovery of the notorious botnet.
- March 03, 2010
Healthcare security managers say their bosses and others are increasing the pressure on them to allow access to social networking and other Internet services, making it more difficult for them to mitigate the potential threats those services pose.
- February 18, 2010
Researcher at NetWitness discovers cache of thousands of bank account credentials, email logins and SSL certificate files related to Zeus infected machines.
- January 11, 2010
Social networks are opening their wallets in a big way to bolster security teams and install new security technologies to combat attacks.
- January 07, 2010
Trend Micro discovers malware attempting to exploit Adobe's latest zero-day vulnerability. A patch is due out next week.
- January 06, 2010
Panda Security's 2009 annual report finds banking Trojans and account credential stealers dominating the threat environment.
- December 17, 2009
Despite inactivity, the number of bots created by the fast spreading Conficker/Downadup worm is in the millions, according to the Shadowserver Foundation, which monitors botnets.