Virus appears to attack Twitter users
Kaspersky Lab experts have issued a warning about a new worm that attacks Twitter accounts. This worm exploits the Google provider path shortening service goo.gl.
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
Kaspersky Lab experts have issued a warning about a new worm that attacks Twitter accounts. This worm exploits the Google provider path shortening service goo.gl.
A flu virus develops and replicates by infecting cells on the body and turning them into virus replicating plants. In a place similar to a computer virus ...
In January 2011, the world has about 50% of computers infected with viruses, this is the latest report of Panda Labs in Vietnam, accordingly, these machines are mainly infected
Survey of Bkav network security company showed that, in 2010, computer virus made users in Vietnam lose 5,900 billion dong.
Security firm Kasperky has announced that smartphone phones are a strong attack on the ZeuS Trojan virus.
Most viruses spread through the Internet in China are the 'work' of only 10 hacker groups, but this Top Ten has very high technology.
Dozens of applications on Android Market have been deleted because of malicious code. Users who have downloaded these infectious applications may lose data.
On March 3, a German cyber security expert, Ralph Langner, said he believed the US and Israel's Mossad intelligence agency had used the Stuxnet computer worm to attack Iran's
According to new research by Kaspersky Lab, the most frequently infected mobile devices are those using the most popular platforms, J2ME and Symbian. And the most popular mobile
An Iranian hacker claimed to take revenge for the nation after the Stuxnet 'worm' attacked the Islamic Republic's nuclear reactors.
Hackers design fake websites to scare Internet users to download and install fake antivirus software.
Recently, a dangerous program appeared on the computer with the ability to hijack the system and give fake notifications to trick users.
Classified as Rootkits, they are created to 'focus' on the main objects and activities of the Windows system, such as files, folders and processes stored in the memory of the
Security firm Symantec said it found evidence that the Stuxnet worm was intended to target uranium enrichment complexes at the Bushehr reactor, Iran. With the help of experts from
When it comes to Trojans, we are referring to a very malicious and dangerous type of computer program that can prevent, modify, back up or delete all user data, cause The main
Norton Internet Security (NIS) 2011 still maintains its inherent strength as fast installation and scanning speed, many impressive features but an inherent limitation is not yet
Security manufacturer Sophos said Facebook users can relax and stop warning each other about a virus with a Christmas tree theme, as this is all a hoax.
With a reasonable price, many useful features and high customization capabilities are what impress the security application AVG Internet Security 2011. However, this version is
Surveys with nearly 70,000 .vn websites using McAfee's website security assessment tool show that only 2.33% of websites contain malicious code, a very small percentage of the
Malware is a term that describes a relatively broad category of malicious software including viruses, worms, trojan horses, rootkits, spyware and adware.