Similar Articles |
|
InternetNews August 2, 2007 Sean Michael Kerner |
Windows Vista Gets Another Dose of The 'Blue Pill' A Black Hat hacker proves more than just a Blue Pill can stymie Windows Vista. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews September 17, 2007 Andy Patrizio |
Have We Reached The End Of The Virus? Not quite. The old-fashioned virus infestation is fading as the biggest nuisance for computer users in favor of Trojans, Symantec's new malware study finds. |
InternetNews August 2, 2006 Andy Patrizio |
Who's Who in Antivirus Software? Despite dominant players, the Black Hat conference has a big cast. Now if only people will use their products. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
InternetNews July 28, 2006 Sean Michael Kerner |
Black Hat 2006: Feeling Insecure in Sin City The people who discover and exploit computer insecurities are at the root of those insecurities. They call them "black hats." This year's Black Hat 2006 Conference promises to be the biggest event in its nearly 10-year history. |
InternetNews July 30, 2007 Sean Michael Kerner |
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. |
InternetNews December 26, 2006 Ed Sutherland |
Vista Security Takes a Hit Vista is proving not to be as unsinkable as Microsoft claimed. |
PC World June 2005 Scott Spanbauer |
Rootkits: Invisible Assault on Windows These clever attacks are not new, but they pose a growing threat to Windows PCs. Since rootkits can work with spyware, viruses, and other malware in blended threats, security vendors are sharpening the tools they'll need for detecting them. |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. |
InternetNews October 31, 2008 Richard Adhikari |
RSA Cracks Down on Legendary Sinowal Trojan Several financial institutions hit by the professionally maintained Trojan. |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. |
InternetNews April 2, 2008 Andy Patrizio |
Do You Know Where That USB Drive Has Been? Antivirus firm finds USB drives and other removable media spread the most prolific forms of malware last month. |
InternetNews October 26, 2007 Andy Patrizio |
Hacker Criminals Find An Exploit In a Fix Adobe issues a fix to an exploit that could allow a rootkit to be installed on unsuspecting computers. The bad guys craft an exploit off that fix within a day. |
PC Magazine September 27, 2006 Robert Lemos |
Your Own Personal Matrix How rootkits can take over your computer and steal data under your nose and how to stop them. |
InternetNews December 14, 2007 Andy Patrizio |
Report: One In Six Computers Has Spyware Infection Internet security vendor Prevx finds that quite a few PCs are infected with rootkits. |
InternetNews November 14, 2006 Andy Patrizio |
More Security Wares Lined up For Vista Security vendors ESET, GRISOFT position their products for Vista. |
InternetNews January 13, 2006 David Needle |
Symantec Gets to Root of Rootkit Controversy Symantec, a leading provider of antivirus and computer security products, said it has addressed a controversy over whether its own software provided a hiding place for Trojans and other security breaches. |
PC World August 2006 Andrew Brandt |
New Rootkit Detectors Help Protect You and Your PC Malware that can be particularly well hidden are ferreted out by these free tools. |
PC Magazine April 20, 2005 Larry Seltzer |
Rootkits: The Ultimate Stealth Attack These underhanded programs go to great lengths to conceal themselves. Luckily, help is on the way. |
InternetNews August 27, 2010 |
Researcher Warns of New 64-Bit Windows Rootkit Security research firm Prevx warns that a new iteration of a familiar rootkit, TDL3, is now in the wild and threatens to compromise 64-bit Windows systems. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
InternetNews August 3, 2006 Andy Patrizio |
Vista Security Mostly Invisible But Thorough What you can't see in Vista is designed to keep malware from hurting you. |
InternetNews January 4, 2007 Ed Sutherland |
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
InternetNews January 11, 2007 Sean Michael Kerner |
Money For Vista, IE Bugs VeriSign's iDefense Labs has kicked off its Vulnerability Contributor Program, a challenge to find remote arbitrary code execution vulnerabilities in Vista and Internet Explorer 7.0. VCP will pay $8,000 for the first six confirmed vulnerabilities. |
InternetNews March 2, 2010 |
Microsoft Patch Aims to Stop Rootkit The latest patch from Microsoft is designed to address a malware distribution that affected some users of Windows XP. |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. |
InternetNews November 14, 2005 Jim Wagner |
Microsoft to Block Sony DRM Rootkit Microsoft has joined other security vendors in pursuit of the rootkit component to Sony's now-infamous anti-piracy measure. |
InternetNews April 15, 2005 Sean Michael Kerner |
A Jump on Security Advisories (For a Fee) iDefense customers get software security advisories well ahead of the rest of the world. |
InternetNews November 17, 2006 Andy Patrizio |
Pirated Vista, Office 2007 Already on The 'Net Pirates have already gotten their hands on Windows Vista and are circulating a "cracked" version of the operating system on the Internet. |
InternetNews August 28, 2009 |
New Trojan Snags Skype Calls on Windows PCs Trojan.Peskyspy beats Skype encryption through Windows API attack. How serious is the threat? |
PC Magazine April 20, 2007 Neil J. Rubenking |
Panda Anti-Rootkit For safely removing every rootkit trace on your system, Panda is the way to go. |
T.H.E. Journal August 2006 Doug Gale |
Can This Virus Be 'Rooted' Out? A new kind of hard-to-detect malware is increasing our vulnerability to hackers and creating headaches for makers of antiviral software. |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. |
InternetNews February 27, 2007 Ed Sutherland |
Storm Trojan Takes Social Measures Storm Trojan uses Web mail, blogs and message boards as conduits for spreading malware code. |
InternetNews November 9, 2007 Andy Patrizio |
MySpace Page For Alicia Keyes Hacked Crafty hackers break the site for Alicia Keyes, add redirects to a site with a rootkit. |
PC Magazine November 29, 2006 Bill Machrone |
Give System Woes the Boot A new class of rootkit, using the virtualization capabilities of new Intel and AMD processors, is impervious to anything but a clean boot from an uninfected disc. |