Similar Articles |
|
InternetNews November 30, 2007 Sean Michael Kerner |
Google Wants Your Help to Fight Malware Google wants to turn the tables on malware and wants you to report malware to Google when you find it. |
PC World December 31, 2007 Erik Larkin |
Malware Evolving Too Fast for Antivirus Apps Bad guys use sophisticated testing to create malware that can evade even the best security programs. |
InternetNews August 9, 2006 Sean Michael Kerner |
Hacking The Dead Cow Yet another malware search engine debuts, but this one doesn't entirely rely on Google. |
InternetNews October 5, 2009 |
HP Hacking Challenge Yields Surprising Results If you thought automated security tools were enough, think again. |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. |
PC Magazine August 1, 2007 Larry Seltzer |
A Long-Ignored Threat: RTF Files A new danger is being exploited by malware. Learn which steps to take in order to avoid becoming a victim... Biggest and worse malicious programs and viruses... |
InternetNews September 18, 2009 |
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. |
Search Engine Watch November 2, 2010 Kristi Hines |
Link Building: 3 Strategies for Link Requests Here's what you need to be aware of when contacting webmasters as a representative of the client or as a brand advocate when requesting links. |
InternetNews July 18, 2006 Sean Michael Kerner |
Google Hacking Malicious Code Security researcher H.D. Moore has released a new malware search engine and its underlying code to help searchers find malware code that Google has indexed. |
InternetNews April 25, 2007 Andy Patrizio |
Microsoft Expands And Unifies Security Efforts Microsoft formally introduced the Malware Protection Center today. |
InternetNews September 5, 2007 Andy Patrizio |
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. |
InternetNews March 10, 2010 |
Mariposa Bot Shipped With Vodafone Smartphone Panda Security discovered Confiker, Mariposa and Lineage password stealing malware samples installed on a recently purchased Vodafone HTC Magic smartphone. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
PC Magazine June 9, 2010 Neil J. Rubenking |
Panda Cloud Antivirus 1.1 Review & Rating Panda Security has spent the last few years mastering behavior-based detection, cloud-based antivirus scanning, and free security software. Panda Cloud Antivirus 1.1 (free, direct) brings all these threads together. |
Search Engine Watch October 5, 2010 Kristi Hines |
Safeguarding Your PC When Link Building Here's what you can do to protect your computer while checking out your competitors' backlinks and avoid losing valuable productivity time if your machine gets infected with malware. |
InternetNews October 28, 2010 |
Google Details Fight Against Malware At the SecTOR security conference in Toronto, researcher with the search giant describes Google's efforts to seek out and block malware to protect users online. |
InternetNews May 8, 2007 David Needle |
A 'Critical' Patch Day For Microsoft Security vulnerabilities in Microsoft Office, Exchange, Internet Explorer and more are addressed. |
PC Magazine March 21, 2007 Neil J. Rubenking |
Spyware Doctor with AntiVirus 5.0 From-scratch rewrite has the virtues and problems of a brand-new program. |
PC Magazine October 16, 2007 Larry Seltzer |
Microsoft on the .Info Block Note to software giant: applying blanket rules isn't good security. |
InternetNews January 27, 2009 Richard Adhikari |
Spammers Ramp Up Short-Lived Web Sites Sites that are here today, gone tomorrow are difficult to track and block. |
InternetNews August 13, 2009 |
Craiglist, AutoCAD Threats Show Virus Variety Malware authors continue showing their creativity, with new viruses making the rounds by targeting Craigslist fans and AutoCAD users. |
PC Magazine March 26, 2007 Neil J. Rubenking |
DriveSentry 2.1 DriveSentry stops bad programs from writing to your drives, but you have to tell it what's bad. |
InternetNews December 31, 2009 |
VoIP Security Issues on the Rise McAfee said its latest research found almost 60 vulnerabilities in VoIP products. |
InternetNews March 21, 2011 Sean Michael Kerner |
Detecting Malware Without Software? New service from Trusteer can pinpoint remote malware running on client PCs. |
InternetNews March 3, 2005 Sean Michael Kerner |
Searchmeup Targets Weak PCs A new adware exploit takes advantage of IE LoadImage vulnerability. |
InternetNews September 9, 2008 Andy Patrizio |
Malware Scanning Moves to the Cloud Instead of burdening the client computer with all the scanning work, antivirus vendors are doing the processing on their systems. |
InternetNews July 6, 2006 Sean Michael Kerner |
Trojans on The March Is it all Microsoft's fault? One security vendor suggests that users may well want to switch to a less-targeted OS. |
InternetNews November 30, 2010 |
Most New Malware Disappears Within A Day: Study New strains of malware are popping up at an unprecedented rate but, fortunately, most of these variants are stamped out within the first 24 hours. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
InternetNews January 3, 2011 |
Fuzzer Finds IE Vulnerabilities A Google researcher makes his "cross fuzz" tool for identifying browser vulnerabilities publicly available. |
Entrepreneur June 2004 Mike Hogan |
Not-So-Good Fellas Keep the bad guys at bay with these steps to improve your company's computer security. You can also try out these resources and Web sites for secure computing. |
InternetNews April 27, 2006 Andy Patrizio |
Linux Malware On The Rise Numerically it pales compared to Windows, but are Linux users even thinking about security? |
InternetNews August 9, 2010 |
Cisco Unveils Top 10 Web Malware Threats Contaminated websites are still a threat, but Cisco's latest security report suggests that are plenty of other Web-borne malware scams that can cost you or your company dearly. |
PC Magazine July 25, 2007 Neil J. Rubenking |
GarbageClean 2.0 Don't rely on GarbageClean for malware protection. It doesn't matter how little it costs -- it's still garbage. |
InternetNews November 9, 2010 |
USB Devices Pose New Security Threats Portable drives and storage devices are a leading source of malware, according to one security software developer. |