Quantcast

Latest Malware Stories

2014-03-05 23:01:51

While one can’t safeguard ones data on outside networks, we can take steps to mitigate the possibility of a security or privacy breach on ones own mobile devices. (PRWEB) March 05, 2014 Many smartphone owners dismiss the need for mobile security applications, preferring to view them as more suited for desktop computing. That view is sadly outmoded. A report by network innovation firm Juniper Networks found that mobile malware threats increased at an incredible rate of 614-percent...

2014-03-04 16:28:57

PLEASANTVILLE, N.J., March 4, 2014 /PRNewswire/ -- On October 8, 2013 the City of Pleasantville ("Pleasantville") discovered that a computer used by a Pleasantville employee was infected with malware. Pleasantville commenced an internal investigation into this incident. Pleasantville retained independent, third-party forensics experts to confirm the extent of this malware intrusion and to assist in remediating the issue. Pleasantville retained privacy and data security legal counsel...

2014-03-04 08:35:30

Innovative, behavioral-based StealthWatch® System continues to be recognized for excellence in network forensics ATLANTA, March 4, 2014 /PRNewswire/ -- Lancope, Inc., a leader in network visibility and security intelligence, has been selected as the Gold winner in the "forensics" category of the 2014 Info Security Products Guide Global Excellence Awards. Through the collection and in-depth analysis of flow data from existing infrastructure, Lancope's innovative StealthWatch System...

2014-03-04 08:27:37

Report provides Internet security highlights for past year, offers 2014 outlook MCLEAN, Va., March 4, 2014 /PRNewswire/ -- CYREN today published its first annual CYREN Security Yearbook that offers a comprehensive look back at last year's Internet security trends. The report also includes a glimpse into upcoming trends for 2014, noting a continued increase in mobile malware, ransomware and targeted attacks. The CYREN Security Yearbook illustrates the strength of the company's data...

2014-03-03 23:02:28

Uroburos - Highly Complex Spyware With Russian Roots Bochum, Germany (PRWEB) March 03, 2014 Security experts at G Data have discovered and analyzed highly sophisticated and complex spyware. This is designed to steal highly sensitive secret information from high potential networks such as national institutions, intelligence services or large corporations. The rootkit, called Uroburos, works autonomously and spreads in the infected networks on its own. Even computers that are not directly...

2014-03-03 23:00:35

Armor for Android is continually evaluating the Android malware landscape and the second edition the monthly Android Malware Roundup has arrived. (PRWEB) March 03, 2014 Armor for Android is continually evaluating the Android malware landscape and the second edition the monthly Android Malware Roundup has arrived. February 2014 revealed malware targeting specific events online and in the real world. Android malware continues to develop characteristics that have previously been found in PC...

2014-02-28 23:02:08

Android malware developers are exploiting the targeted advertising method provided by Facebook’s suggested posts. (PRWEB) February 28, 2014 Android malware developers are exploiting the targeted advertising method provided by Facebook’s suggested posts. This advertising method allows them to display ads only to Facebook users browsing on an Android device in a specific region ensuring their ads will only be displayed to vulnerable Facebook users. The malware delivered by these...

2014-02-28 12:29:45

ABINGDON, England, February 28, 2014 /PRNewswire/ -- Kaspersky Lab has today published [http://www.securelist.com/en/analysis/204792327/Spam_report_January_2014 ] the results of the company's spam monitoring for January 2014. Top 3 stories in January: - Detection of emails claiming to be from the popular WhatsApp messenger for smartphones. The messages stated that an attached archive contained a photo from a "friend". The...

2014-02-27 16:33:31

VIPRE antivirus solution to offer fully integrated security management for Microsoft Windows Server Hyper-V virtual environments CLEARWATER, Fla., Feb. 27, 2014 /PRNewswire/ -- ThreatTrack Security today announced the availability of the latest versions of VIPRE, the cybersecurity firm's enterprise endpoint protection solution. VIPRE Antivirus Business 6.5 and VIPRE Business Premium 6.5, featuring support for Windows Server with Hyper-V, can now be fully deployed via the hypervisor,...

2014-02-27 13:03:46

Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Tech have created a prototype software, Gyrus, that takes extra steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers. Current protection programs might recognize the original...


Latest Malware Reference Libraries

0_173bb487cd480e12bc1008c4301cd186
2013-03-16 00:00:00

A wiki is simply a website that allows the users to create and edit any number of interlinked web pages through a simplified markup language. They are often powered with wiki software and used to collaborative wiki websites, power community websites, for note taking, and in knowledge management systems. Some wikis serve specific purpose while others are more of an open content format. Wiki, meaning fast in Hawaiian, was first created by Ward Cunningham who developed WikiWikiWeb. Wikis...

More Articles (1 articles) »
Word of the Day
Cthulhu
  • A gigantic fictional humanoid alien god being described with a head resembling an octopus and dragon wings and claws, around whom an insane cult developed.
  • Pertaining to the mythos of Cthulhu and additional otherworldly beings created by H. P. Lovecraft or inspired by his writings and imitators.
This word was invented in 1926 by H.P. Lovecraft for his short story, 'The Call of Cthulhu.' 'Cthulhu' may be based on the word 'chthonic,' which in Greek mythology refers to the underworld.
Related