Similar Articles |
|
PC Magazine July 25, 2007 Neil J. Rubenking |
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. |
PC Magazine January 16, 2007 Neil J. Rubenking |
Cyberhawk Pro 2.0 Cyberhawk's behavior-based analysis catches zero-day threats. |
PC Magazine June 9, 2010 Neil J. Rubenking |
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. |
PC Magazine November 13, 2009 Neil J. Rubenking |
Panda Cloud Antivirus Free Edition 1.0 Panda Cloud Antivirus offers free malware protection in a lightweight package with an ultra-fresh user interface... Norton Internet Security 2010... |
PC Magazine August 17, 2009 Neil J. Rubenking |
BitDefender Total Security 2010 BitDefender Internet Security 2010 is strong where many suites are weak, and includes top-notch malware detection... eScan Internet security Suite for Home Users Version 10... |
PC Magazine March 21, 2007 Neil J. Rubenking |
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. |
PC Magazine July 6, 2007 Neil J. Rubenking |
Ad-Aware 2007 Pro The new version of Ad-Aware is faster and prettier, but the retooled version of this ground-breaking antispyware app can't handle the worst spyware threats lying in wait for you on the Internet. |
PC Magazine April 20, 2005 Larry Seltzer |
Rootkits: The Ultimate Stealth Attack These underhanded programs go to great lengths to conceal themselves. Luckily, help is on the way. |
PC Magazine August 31, 2007 Neil J. Rubenking |
Panda Internet Security 2008 Panda Internet Security 2008 got the best score we've ever seen in anti-spyware testing, but some other features need work. |
PC World June 2005 Scott Spanbauer |
Rootkits: Invisible Assault on Windows These clever attacks are not new, but they pose a growing threat to Windows PCs. Since rootkits can work with spyware, viruses, and other malware in blended threats, security vendors are sharpening the tools they'll need for detecting them. |
PC World August 2006 Andrew Brandt |
New Rootkit Detectors Help Protect You and Your PC Malware that can be particularly well hidden are ferreted out by these free tools. |
PC Magazine July 17, 2006 Neil J. Rubenking |
Spy Sweeper 5.0 True to its title, Spy Sweeper 5 sweeps away spyware. With new features increasing protection against keyloggers and rootkits, Spy Sweeper remains a favorite for protection from spyware. |
PC Magazine July 26, 2007 Neil J. Rubenking |
STOPzilla 5.0 When you hear the name STOPzilla, you expect a 50-meter-tall security behemoth that incinerates spyware with devastating atomic breath. Not so much. |
PC Magazine September 1, 2011 Neil J. Rubenking |
AVG Anti-Virus Free 2012 AVG Anti-Virus Free 2012 scans quickly and does a good job both cleaning up existing malware and preventing new infestation. Independent labs rate it high, too, and it includes bonus protection against phishing and exploits. |
PC Magazine July 8, 2009 Neil J. Rubenking |
Norton Internet Security 2010 (beta) It's only a beta but Norton Internet Security 2010 is already our new anti-malware champion - and its antispam and parental controls take big strides forward, too. |
PC Magazine September 27, 2006 Robert Lemos |
Your Own Personal Matrix How rootkits can take over your computer and steal data under your nose and how to stop them. |
PC World August 25, 2006 Narasu Rebbapragada |
Spyware Fighters Five antispyware programs focus on tackling the latest threats: Webroot Spy Sweeper 5.0, Spyware Doctor 3.8, CounterSpy 2.0, Ad-Aware SE Personal 1.06, and Spybot. |
PC Magazine September 24, 2008 Neil J. Rubenking |
Trend Micro Internet Security Pro v2 Trend Micro Internet Security v2 offers good to very good protection in all areas, along with truly useful bonus features. |
PC Magazine January 22, 2008 Neil Rubenking |
Spyware Doctor with AntiVirus 5.5 Treating your malware infestation with Spyware Doctor can take time and effort, but the end result is a near-total recovery for your PC. |
PC World July 2005 Andrew Brandt |
Security Tips: Identify Malware Hiding in Windows' System Folders Fortunately, once identified, malware is usually fairly easy--albeit tedious--to clean up. So follow these detection procedures, and your PC will be in good shape. Also, several available programs will help you spot, and in one case, remove, dangerous rootkit files. |
PC Magazine September 28, 2005 Neil J. Rubenking |
RootkitRevealer Causes Concern RootkitRevealer discovered three files that have the name filename.doc:zone.identifier. What is "zone.identifier" and is it malicious? |
PC Magazine July 21, 2004 Jay Munro |
Panda Platinum Internet Security Suite 8.0 With daily virus-pattern file updates, extensive configurability, and easy-to-use interface, Panda is a good choice for both home and business users looking for antivirus and Web filtering tools in one suite. |
InternetNews December 14, 2007 Andy Patrizio |
Report: One In Six Computers Has Spyware Infection Internet security vendor Prevx finds that quite a few PCs are infected with rootkits. |
PC Magazine December 21, 2005 Larry Seltzer |
Heard Any Good Malware Lately? Digital rights shouldn't violate civil rights as Sony's DRM rootkit seems to do. |
PC Magazine April 25, 2007 Neil J. Rubenking |
Finjan SecureBrowsing Finjan SecureBrowsing helps you steer clear of dangerous sites, but isn't completely reliable yet. |
InternetNews January 10, 2008 Andy Patrizio |
New Rootkit Targets the Drive's MBR The bad guys got the idea from Black Hat and a security firm, illustrating the risks of bringing vulnerabilities to light. |
PC World May 2002 Stan Miastkowski |
Care and Feeding of the Windows Registry Proper maintenance of the Registry can help keep your PC happy and healthy... |
PC Magazine November 14, 2007 Bill Dyszel |
Recover From Regeditphobia Tips on how to prevent disastrous registry edits in Windows. |
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |
InternetNews August 27, 2010 |
Researcher Warns of New 64-Bit Windows Rootkit Security research firm Prevx warns that a new iteration of a familiar rootkit, TDL3, is now in the wild and threatens to compromise 64-bit Windows systems. |
InternetNews November 2, 2005 Jim Wagner |
Digging Out Sony's DRM Rootkit Using a technique popularized by malware writers, Sony runs software behind the scenes of its copy-protected CDs. |