Malware virus Trojan and spyware protection and removal
- April 01, 2010
The recent arrests of those suspected of being connected to the Mariposa botnet and the legal action by Microsoft to take down the command and control of the Waledac botnet may be a sign that those defending the Internet are gaining ground against ...
- March 17, 2010
Internet service providers have the ability to wipe nearly all malicious activity in their networks without stepping on individual privacy and civil liberties, says network security expert Adam Rice of Tata Communications Ltd. Rice, chief security ...
- March 11, 2010
Despite a quarter of the Zeus command- and- control network being wiped out, security researchers observed a quick recovery of the notorious botnet.
- March 03, 2010
Healthcare security managers say their bosses and others are increasing the pressure on them to allow access to social networking and other Internet services, making it more difficult for them to mitigate the potential threats those services pose.
- February 18, 2010
Researcher at NetWitness discovers cache of thousands of bank account credentials, email logins and SSL certificate files related to Zeus infected machines.
- January 11, 2010
Social networks are opening their wallets in a big way to bolster security teams and install new security technologies to combat attacks.
- January 07, 2010
Trend Micro discovers malware attempting to exploit Adobe's latest zero-day vulnerability. A patch is due out next week.
- January 06, 2010
Panda Security's 2009 annual report finds banking Trojans and account credential stealers dominating the threat environment.
- December 17, 2009
Despite inactivity, the number of bots created by the fast spreading Conficker/Downadup worm is in the millions, according to the Shadowserver Foundation, which monitors botnets.
- December 14, 2009
The Conficker botnet remains dormant, but several ongoing investigations are turning up mounting evidence against those responsible for the worm.
- December 08, 2009
The Cisco Annual Security Report highlights the best and worst in the cybercriminal investment portfolio for 2010.
- November 19, 2009
Symantec researchers predict an increase in attacks using social network architectures, third-party applications and URL shortening services.
- November 03, 2009
Malware detection has become more difficult as cybercriminals adapt quickly to security technologies to find a way into corporate networks, create botnets and ultimately steal data. A new class of modern malware is wreaking havoc on corporate ...
- November 02, 2009
Microsoft's biannual report finds rogue antivirus infections and Trojan and downloader attacks down in the first six months of 2009.
- November 02, 2009
Reports highlight surge in spam as well as an increase in malicious Web pages attacking visitors with Trojan malware and downloaders.