- Natwest website targeted in DDOS cyber attack
- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
- Apple knows where shoppers are in its stores with nationwide iBeacon rollout
- NSA cites Reagan-era executive order to justify collection of cellphone location data
- US faces major Internet image problem, former gov't official says
- MenuetOS inches towards 1.0
- Telstra hits 300 Mbps in LTE-A trial
- Black Friday bargains prompt consumers to self-gift iPad Air
- .xxx to launch porn search engine
malware in pictures
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
Microsoft and law enforcement agencies said Thursday that they disrupted a botnet that defrauded online advertisers of US$2.7 million a month but that the malicious network hasn't been completely eliminated.
Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."
Tami asked the Antivirus & Security Software forum why friends are receiving spam that appears to come from her.
SUPERAntiSpyware found three Trojans on a reader's PC. He asked the Windows forum how this could happen when his PC is protected.
You wouldn't let your kids walk the streets of Amsterdam's Red Light District, but giving them unrestricted access to the Web is practically the same thing. The problem is, how do you block out all that inappropriate Web content?
Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs makes the Adobe file format one of the most targeted and exploited by malicious attacks as well.
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities that plague the dominant Microsoft Windows operating system? Well, don't believe the hype. Apple unleashed an update for Mac OS X this week which fixes a massive 134 vulnerabilities.
Whitepapers about malware
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!
Microsoft Security Essentials provides your home PC with real-time protection. It constantly uses the latest technology ensuring that you will always stay up to date ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest