Malware virus Trojan and spyware protection and removal
- October 08, 2008
Security researchers released details of the clickjacking attacks, warning of the seriousness of the problem because they have discovered multiple variants on the Web.
- September 10, 2008
A new survey shows more companies are protecting their systems from Web 2.0 threats to avoid data theft.
- August 27, 2008
Attackers install a rootkit on the compromised systems to steal more SSH keys.
- August 20, 2008
Security researcher developed a tool to cure infected Windows Media audio and video files with GetCodec Trojans, a form of media based malware.
- August 12, 2008
New cloud-based approach uses multiple antivirus engines, offers better malware detection and beats traditional antivirus software in tests.
- August 04, 2008
Web security vendors Zscaler Inc., Purewire Inc. enter growing Software as a Service (SaaS) space dominated by appliance vendors
- July 31, 2008
Researcher to demonstrate hacking methods that enable malware authors to shield their programs from analysis.
- July 22, 2008
The Azure tool uses virtualization extensions in Intel chips to give security researchers the upper hand by avoiding detection from malware.
- July 08, 2008
Attackers are actively targeting a flaw in Microsoft Word, according to Symantec.
- July 02, 2008
In this podcast, Scott Matsumoto, a secure coding expert with Cigital Inc. explains the tools available to software developers and security pros to protect against SQL injection.
- June 30, 2008
In this podcast, noted security researcher Greg Hoglund, who specializes in Windows rootkits and secure coding, explains why software is just as vulnerable today as it was in 1999.
- May 06, 2008
Websites suspected of spreading malicious programs or spamming and phishing campaigns will be highlighted in search results.
- April 23, 2008
The spread of Trojan horses via downloaders and droppers is multiplying rapidly, infecting nearly 19 million computer users in the second half of 2007.
- April 22, 2008
Researchers are tracking new phishing methods that steal a victim's information and spread a Trojan designed to pilfer even more data.
- April 16, 2008
An analysis conducted by the SANS Institute's Internet Storm Center uncovered a utility designed to perform automated SQL injection attacks against websites and spread malware.