Malware
138
-
How Attackers Use botnet malware to Remotely Control Your Device
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely. Botnets generally are created…
Read More » -
Business
24 percent of computers are still unprotected from viruses and malware -Microsoft
An average of 24 percent of computers around the world are still unprotected and therefore vulnerable to cyber attacks. According…
Read More » -
Gadgets
How to protect your phone from snoops
What can you do to shield yourself from snoops who gain possession of your phone? Your apps, messages, address book,…
Read More » -
Features
Android Accounted For 79% Of All Mobile Malware In 2012, 96% In Q4 Alone
Is it because Android is the most popular smartphone platform in the world right now, or is it because it’s just fundamentally…
Read More » -
Scientists develop program to locate source of malware, spam attacks
Ever wondered where those numerous spam messages you find in your email inbox originate from? Or who originally started that…
Read More » -
News Archive
Gaddafi’s death photos used as Scam, security experts
IT security and data Protection Company Sophos is warning of a malicious email attack, one of the first to capitalise…
Read More » -
Learn
How a Cloud Antivirus Works
Whether you have years of computing behind you, or you've just bought your first laptop or desktop, you're probably familiar…
Read More » -
Research
If you use mobile devices, malware will come
IT people who try to secure mobile devices in a big company face three big conceptual problems. First, many, if…
Read More » -
How - To
Six Cool Things to Do With Your USB Flash Drive
What do you use your USB flash drive for? Perhaps you store work documents, photos, music, or movies on them.…
Read More »