Malware virus Trojan and spyware protection and removal
- November 17, 2008
Symantec researchers have discovered a new worm attacking the Windows CE platform on ARM processors.
- November 14, 2008
Increased cooperation among security researchers and ISPs are resulting in victories against spammers and botnet operators. But, cybercriminals move to new spots on the Internet.
- November 13, 2008
A rise in social engineering tactics leave some industries more at risk to malware exposure, according to a report from ScanSafe Inc.
- November 06, 2008
New malware is targeting the Microsoft RPC flaw, Microsoft warns. Companies should deploy the emergency patch immediately to prevent hacker attacks.
- November 03, 2008
In its semiannual Security Intelligence Report, Microsoft says it has seen a significant drop in vulnerabilities discovered in the operating system.
- October 17, 2008
Researchers at CA said the malicious program tries to trick users into downloading a fake spyware removal tool. Only a few differences help distinguish it from a legitimate one.
- October 08, 2008
Security researchers released details of the clickjacking attacks, warning of the seriousness of the problem because they have discovered multiple variants on the Web.
- September 10, 2008
A new survey shows more companies are protecting their systems from Web 2.0 threats to avoid data theft.
- August 27, 2008
Attackers install a rootkit on the compromised systems to steal more SSH keys.
- August 20, 2008
Security researcher developed a tool to cure infected Windows Media audio and video files with GetCodec Trojans, a form of media based malware.
- August 12, 2008
New cloud-based approach uses multiple antivirus engines, offers better malware detection and beats traditional antivirus software in tests.
- August 04, 2008
Web security vendors Zscaler Inc., Purewire Inc. enter growing Software as a Service (SaaS) space dominated by appliance vendors
- July 31, 2008
Researcher to demonstrate hacking methods that enable malware authors to shield their programs from analysis.
- July 22, 2008
The Azure tool uses virtualization extensions in Intel chips to give security researchers the upper hand by avoiding detection from malware.
- July 08, 2008
Attackers are actively targeting a flaw in Microsoft Word, according to Symantec.