Saturday, March 8th, 2008
Some industry analysts are proclaiming the traditional antivirus method for detecting and eradicating viruses, trojans, spyware and other baneful code by matching it against a signature to be "dead."
They say signature-based checking can't keep up with the flood of virus variants manufactured by a criminal underworld that is beating the ...
Posted in Security | No Comments
Saturday, March 8th, 2008
1. Thou shalt not buy merchandise found in pop-up ads or spam.
2. Thou shalt not post thy email address, phone number, address or social security number to the internet, nor shalt thou post anyone else's.
3. Thou shalt not forget to update thy Windows every second Tuesday.
4. Thou shalt not connect ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
Makers of antispyware and antivirus programs, pay attention to this article.
An ugly trend is developing in the world of antispyware. It is my belief that, very soon, all current tools and methods used to detect and remove malware will become obsolete. Very soon, malware will be able to load ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...
Posted in Hardware, Internet, Privacy, Security | 1 Comment
Saturday, March 8th, 2008
Anti-spyware company Webroot Software Inc. Monday announced what it claims is the industry's first automated spyware research system. Called Phileas, the system relies on bots--computer programs that perform tasks in lieu of a person--that continually crawl the Web, looking for spyware, adware, and the sites that host such software. Webroot ...
Posted in Security | No Comments
Page 12 of 13« First«...910111213»