Posts Tagged ‘trojan’

Controls against industrial Malware

Malicious software is called a malware and malware may include viruses, worms and trojans. A virus is a piece of code which is capable of replicating itself and mainly it depends on a host file (a document) to reach its target. However worm does not rely on the host file to reach the target but […]

Leave a Comment

Pop-Up Security Warnings Pose Threats

Image by Travelin’ Librarian via Flickr Malware: Fighting Malicious Code By FBI NPO The FBI warned consumers today about an ongoing threat involving pop-up security messages that appear while they are on the Internet. The messages may contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. […]

Comments (2)

Five ways to lose your identity

By Jaikumar Vijayan The rush by shoppers to the Web makes the season a great time for online retailers. It’s also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online. Checkout huge savings on Today’s Hot Deals on Information Security Solutions for […]

Comments (1)

Facebook, MySpace users hit by cyber attacks

Image by sitmonkeysupreme via Flickr NZ HERALD reported that Facebook users – already being targeted in a malware campaign – are now under threat from a phishing scam. Security specialists Symantec report that the company’s systems have picked up fake messages that appear to be sent by the social networking service. Users will receive an […]

Leave a Comment

Harmful Spyware and their stealthier means

Spyware is utilized to gather information about a person with or without their consent and it intercept or record personal/financial information. Some spyware are capable of sending information back to another computer (originator of the spyware). Characteristic of Spyware • Compromise user machine without their knowledge • Use vulnerabilities in the software to push a […]

Comments (8)

SmartPhone and Security

Mobile spyware is malicious software which is used to spy and control mobile devices (BlackBerry, PDAs, Windows Mobile and Cell Phones). Mobile spyware will not only intercept the message between two devices but also determine the location of the device. Basically, mobile spyware software is installed on a mobile device to spy on them. Small […]

Comments (1)


SEO Powered By SEOPressor