July 28, 2011
readings: 293
Where Does Your Malware Come From? [Infographic]
Where does your malware come from? How does it get to your computer? It is not like there is some magical, malicious stork that comes and drops off some demented baby into your operating system that makes it join a botnet at knife point. There is no stork, there is no baby. Blue Coat security [...]
Continue reading..
June 30, 2011
readings: 175
Mariposa Botnet is alive (?)
‘Butterfly bot’ kit steals financial information, but its licensing model could ultimately lead authorities to its newest botmasters. A financial-fraud botnet built with the same malware kit used in the now-defunct Mariposa botnet remains active after arrests this month of two Eastern European men who allegedly ran it. Researchers at Unveillance, Panda Labs, and Damballa [...]
Continue reading..
April 19, 2011
readings: 5,086
Best Antivirus for Windows 7 – AV-Test 2011/Q1
AV-Test, one of the most influential independent labs for testing, certification and comparative analysis of IT security products, as usual, has issued its first report of the year, certifying 17 out of 22 of the Best Antivirus products for Windows 7 in 2011. AV-Test certifies Antivirus or Security Suites that achieve a cumulative score at [...]
Continue reading..
March 29, 2011
readings: 441
MrxCls – Malicious driver and primary attack of Stuxnet
There has been much attention placed on Stuxnet by the world media since it was widely reported in the summer of 2010. As we have seen the evolution of malware from mere annoyance, to organized crime over the years, Stuxnet marks the first known targeted malware attack designed to damage physical property, capable of destroying buildings, [...]
Continue reading..
March 5, 2011
readings: 379
Carberp: Silent trojan, eventual successor to ZeuS
Today the vast majority of consumer banking and bill payment is done online. Due to the fact that online transactions are growing in volume, malware authors are increasingly focused on developing malicious software designed to steal personal data from infected PCs. A online black market exists where different crimeware packages (Kits for the creation of [...]
Continue reading..
February 18, 2011
readings: 275
G Data: Malware Growth Rate Stabilizes, Mobile Devices are the New Frontier of Crimeware
February is a time of the year when we get to see if the trends predicted last year are coming to pass. It is also a time of preparation for the long months ahead in the battle against malware. So far, there is no consensus on what is going to be “Threat of the year” [...]
Continue reading..
February 16, 2011
readings: 177
AVG releases online security assessment tool for small and medium businesses
Free software giant AVG released today a free self-audit tool to help small and medium businesses gauge their security needs. The tool, named AVG Online Security Audit, creates customized reports and recommendations for small and medium businesses who typically have a small or nonexistent IT staff. In creating the reports, AVG hopes to educate and [...]
Continue reading..
Random Articles
June 20, 2010
readings: 176
What is Phishing?
Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.
Continue reading..
June 22, 2010
readings: 87
What is spam?
Every Internet user knows the word ‘spam’ and sees it in their inbox quite often. But not everyone knows that years ago the word ‘spam’ had nothing to do with either the Internet or emails.
Continue reading..
June 22, 2010
readings: 25,179
What is Spyware?
Spyware are small programs that are installed on our system in order to steal our data and spy our movements through the network.
Continue reading..
June 20, 2010
readings: 68
What is Adware?
Adware “Advertising-Supported”, in other words, these programs are created to show advertising.
Continue reading..
See more articles in the archive
Latest news (in Spanish)
- Antivirus de Microsoft bloqueó a la página de Google por ser maliciosa
- Boletines de seguridad de Microsoft en febrero
- Video en Facebook propaga troyano en San Valentín
- Parches de seguridad de Microsoft el próximo Martes 14