Tag: Malware

11
Jan

Rogue Security Programs and How You Can Avoid Them

If you think all anti-virus programs you spot are for your protection, you need to change your opinion. There are plenty of rogue security softwares or fake anti-virus programs out there that provide you with little or no protection at all. Also known as scarewares, most of these misleading programs even facilitate the installation of malicious code that they claim

Read more

4
Sep

Crisis: Threatening Your Virtual Machines

The virtual machines and networks have been free from any malware attack and threats so far. However, we have recently found a new breed of malware that can not only attack Windows and Mac OS X but also infect other environments including virtual machines as well. This malware is known as Crisis or Morcut which…

13
Aug

Great tips when it comes to your IT security

IT security has become a serious concern for all companies and individuals due to the rising number of cyber attacks. From previous experiences, we have found that no security system or firewall is strong enough to protect the IT structure from all those new and devastating worms, threats and attacks. However, there are a number…

17
Jul

Malware in Apple’s App Store Targets Users’ Contact Lists

If only there were an app for blocking malware, viruses and other hacking tools, using the Internet and downloading data would be a lot less scary. One recent threat targeted the contact lists of people who download a particular app from Apple’s App Store or Google’s Adroid Market. The app in question is called “Find…

6
Jul

Temporary Servers Cut Off Any Day Now; Are You Prepared?

Maybe replacing infected servers with clean, though temporary, ones was a mistake on the FBI’s part. Many, including executives at large enterprises, have taken their sweet old time about having the DNSChanger malware removed from their computers. According to an article on the Internet Identity website, as of Jun. 28, 2012, approximately 12% of Fortune…

21
Jun

Preventing Mobile Malware Attacks in Canadian Business

According to a recent article on the IT Business Edge blog, many people understand that there are viruses that can attack their personal computers. However, many don’t understand that there are viruses that can attack mobile phones as well. If you’ve heard the term “mobile malware,” then you’ve heard about these viruses that are designed…

11
Jun

Kaspersy Lab Discovers Flame Malware More Intricate Than Suspected

On May 29, 2012, Kaspersky Lab issued a press release announcing that as the result of an investigation prompted by the International Telecommunication Union (ITU), its technicians had discovered a new cyber-espionage malware known as Flame. On Jun. 4, 2012, the security software vendor issued another press release, providing a more detailed description of just…

31
May

Flame Malware Detected and Eradicated by Leading Security Solutions

According a post on the Trend Micro blog TrendLabs, there’s an information stealing malware known as Flame that has been traversing Iran and other countries since 2010. Considered one of the most sophisticated forms of malware around, Flame can steal computer display contents, stored files, and capture recording audio and screen shots via the microphone…

23
May

Six Security-Beating Methods Cybercriminals Use to Access Networks

The quest to thwart cybercriminals never ends. As security software and firewalls become more sophisticated, so do cybercriminals. No longer do they simply upload malware or viruses or send clever email messages designed to trick recipients into clicking on links that lead to malicious websites. They have concocted far more devious methods of gaining access…

15
May

2 New Russian Ransomware Scams – Warn Your Employees

From: CyberheistNews Check out their free phishing test at http://www.knowbe4.com/phishing-security-test/  Just in the last week, two new Ransomware scams were found in the wild. One scam accuses the end-user of copyright violation, as content was found on the victim’s PC and has been moved to an encrypted directory. To release the encrypted data, and to prevent…

CONTACT US