July 28, 2011

readings: 293



Where Does Your Malware Come From? [Infographic]

Where does your malware come from? How does it get to your computer? It is not like there is some magical, malicious stork that comes and drops off some demented baby into your operating system that makes it join a botnet at knife point. There is no stork, there is no baby. Blue Coat security [...]

Continue reading..

June 30, 2011

readings: 175



Mariposa Botnet is alive (?)

‘Butterfly bot’ kit steals financial information, but its licensing model could ultimately lead authorities to its newest botmasters. A financial-fraud botnet built with the same malware kit used in the now-defunct Mariposa botnet remains active after arrests this month of two Eastern European men who allegedly ran it. Researchers at Unveillance, Panda Labs, and Damballa [...]

Continue reading..

April 19, 2011

readings: 5,086



Best Antivirus for Windows 7 – AV-Test 2011/Q1

AV-Test, one of the most influential independent labs for testing, certification and comparative analysis of IT security products, as usual, has issued its first report of the year, certifying 17 out of 22 of the Best Antivirus products for Windows 7 in 2011. AV-Test certifies Antivirus or Security Suites that achieve a cumulative score at [...]

Continue reading..

March 29, 2011

readings: 441



MrxCls – Malicious driver and primary attack of Stuxnet

There has been much attention placed on Stuxnet by the world media since it was widely reported in the summer of 2010.  As we have seen the evolution of malware from mere annoyance, to organized crime over the years, Stuxnet marks the first known targeted malware attack designed to damage physical property, capable of destroying buildings, [...]

Continue reading..

March 5, 2011

readings: 379



Carberp: Silent trojan, eventual successor to ZeuS

Today the vast majority of consumer banking and bill payment is done online.  Due to the fact that online transactions are growing in volume, malware authors are  increasingly focused on developing malicious software designed to steal personal data from infected PCs. A online black market exists where different crimeware packages (Kits for the creation of [...]

Continue reading..

February 18, 2011

readings: 275



G Data: Malware Growth Rate Stabilizes, Mobile Devices are the New Frontier of Crimeware

February is a time of the year when we get to see if the trends predicted last year are coming to pass. It is also a time of preparation for the long months ahead in the battle against malware.  So far, there is no consensus on what is going to be “Threat of the year” [...]

Continue reading..

February 16, 2011

readings: 177



AVG releases online security assessment tool for small and medium businesses

Free software giant AVG released today a free self-audit tool to help small and medium businesses gauge their security needs.  The tool, named AVG Online Security Audit, creates customized reports and recommendations for small and medium businesses who typically have a small or nonexistent IT staff.  In creating the reports, AVG hopes to educate and [...]

Continue reading..

Random Articles

June 20, 2010

readings: 176



What is Phishing?

Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.

Continue reading..

June 22, 2010

readings: 87



What is spam?

Every Internet user knows the word ‘spam’ and sees it in their inbox quite often. But not everyone knows that years ago the word ‘spam’ had nothing to do with either the Internet or emails.

Continue reading..


June 22, 2010

readings: 25,179



What is Spyware?

Spyware are small programs that are installed on our system in order to steal our data and spy our movements through the network.

Continue reading..

June 20, 2010

readings: 68



What is Adware?

Adware “Advertising-Supported”, in other words, these programs are created to show advertising.

Continue reading..


See more articles in the archive

Latest news (in Spanish)

  • Antivirus de Microsoft bloqueó a la página de Google por ser “maliciosa”
  • Boletines de seguridad de Microsoft en febrero
  • Video en Facebook propaga troyano en San Valentín
  • Parches de seguridad de Microsoft el próximo Martes 14
 
spacer spacer spacer

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.