Blog Posts Tagged with "Antivirus"
Top Five Antivirus Programs for 2011
January 05, 2011 Added by:Headlines
Malware is consistently listed as one of the most serious threats to consumer and enterprise security. The results of this independent comparison conducted by security professionals provides those in the market for antivirus software a great starting point for making your selection...
Comments (1)
Security Threats Lurk in Adobe PDF Documents
January 04, 2011 Added by:Headlines
A researcher has identified several flaws in the portable document file standard that produce some serious vulnerabilities. One finding shows the ability for a PDF to contain code for a database scanner that activates when the document is sent to a hub printer and can scan the entire network...
Comments (0)
Are You Protected From Zeus?
December 31, 2010 Added by:Robert Siciliano
Zeus is designed to steal bank account login credentials. It has traditionally targeted PCs, but has now been updated to attack cell phones as well, with one version of the malware intercepting SMS confirmations sent by banks to customers, and defeating the fund transfer authorization codes...
Comments (0)
Eleven Tips for Secure Online Shopping
December 22, 2010 Added by:Robert Siciliano
Here are eleven tips to have a safe online shopping experience during the holiday season: Avoid spoofed websites - Common sense says any time you receive an offer via an e-mail automatically be suspicious. The same goes with offers via tweets and messages received in any social media site...
Comments (7)
Criminal Hackers: The Soldiers of the Web Mob
November 20, 2010 Added by:Robert Siciliano
This criminal entity is one of the most sophisticated and damaging on the Internet, and perfected a mass-production system for deploying phishing sites and crimeware– malware designed specifically to automate identity theft and facilitate unauthorized transactions from consumer bank accounts...
Comments (0)
Why an Anti-Virus Can’t Protect You from All Viruses
November 18, 2010 Added by:Dan Dieterle
Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...
Comments (2)
Botnets Turn Your PC into a Zombie
November 12, 2010 Added by:Robert Siciliano
Consumers’ and small businesses’ lax security practices are giving scammers a base from which to launch attacks. Hackers use botnets to send spam and phishing emails, and to deliver viruses and other malware...
Comments (0)
Managing Antivirus Software - Keep the Reinstall Away
October 14, 2010 Added by:Bozidar Spirovski
Depending on whether you are running a home or corporate environment, you face different challenges with antivirus solutions. But regardless of environment and product, you will be very grateful that you are running an antivirus the day someone you know looses data...
Comments (1)
Stuxnet, Aurora: Why AVs Fail and Why We Need Them
October 05, 2010 Added by:Pascal Longpre
Operation Aurora, which attacked Google and other Fortune 1000's last year, and the recent Stuxnet worm targeting SCADA systems - nuclear and energy power plants, are here to remind us of the failure of traditional antiviruses to protect systems against targeted high level attacks...
Comments (7)
McAfee Pursues Embedded Device Security
September 29, 2010 Added by:Danny Lieberman
The discussion about supporting integration of multi-vendor channels sort of smells like an Intel aphorism, and while it might serve Intel, channel integration may be the exception rather than the rule in the medical device space. When you have a hammer, everything looks like a nail...
Comments (1)
Houston, We Have a Problem - Spam Virus Hits NASA
September 15, 2010 Added by:Theresa Payton
A virus hit the globe recently creating a nuisance for some and a real outage for others. The spam went right past most anti virus software. Organizations noted as impacted by ABC News were NASA, Comcast, AIG, Disney, Proctor and Gamble, Florida Department of Transportation, and Wells Fargo...
Comments (0)
Detecting Trojans and Worms with Network Analyzer
September 09, 2010 Added by:Ray Tan
As network security professionals, we definitely understand the importance of antivirus software, as it is always the first choice for most enterprises and home users. But it disappoints me that although antivirus software has adapted to cloud computing, it still works on signature detection method...
Comments (5)
On Anti-Malware for the PC
August 28, 2010 Added by:Guy Pace
Commercial anti-malware software costs money. Not just when you buy it, but every year when you renew the license. That is how the large security software companies pay for the huge costs of research, testing and evaluating malware to keep their products current and effective...
Comments (2)
AV software on Linux?
June 04, 2010 Added by:Rod MacPherson
I recently got involved in a discussion around the value of AV software on the Linux platform in an Ubuntu user group on Linked-in. Along-side much discussion over what people use and why, there was a fair bit of (in my opinion, misdirected) opinion that AV is not needed on Linux due to how hard it is to write a "virus" for that platform.
Comments (6)
It’s Time to Re-evaluate Host-based Security
May 12, 2010 Added by:Andrew Baker
I’ve said it for a few years now, but host-based antivirus is really not working out anymore. Not with its focus on enumerating bad code and its reliance on signatures to detect malware. Recently, several prominent antivirus vendors have experienced problems with faulty virus definitions
Comments (5)
Useless Account Control
October 22, 2009 Added by:Sudha Nagaraj
In these days of heightened security awareness, I would think any and every operating system should boast of a robust anti-virus software suite. The fact that Microsoft released its much-awaited and highly proclaimed Windows 7 OS today without built-in anti-virus software continues to puzzle me.
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization