6 steps to plan harmful software counter-attacks
As a security administrator, we strive to be a pioneer in this area - apply pieces and updates, penetration testing and set-up policies. Unfortunately, sometimes the defense is on
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
As a security administrator, we strive to be a pioneer in this area - apply pieces and updates, penetration testing and set-up policies. Unfortunately, sometimes the defense is on
Originating from Russia, this program can establish relationships with more than 10 people in just 30 minutes and hardly anyone thinks it's not the real person communicating. It
Google Orkut, a virtual social network user, is suffering from a new computer worm called Orkut. Although Orkut is not dangerous, it is seen as evidence of fatal flaws in web
Christmas has once again facilitated the dangerous computer worm, Storm Worm, to attack people using the Internet with dangerous new malicious codes. Beginning yesterday (December
While you're sleeping well, your computer may be working as a peer-to-peer spam or node server, providing a source of processing for a malware network that pulls in any form of
WORM_VB.ZAA is a new virus that attacks and infects Windows computers, they spread when users activate Windows Media Player. Security company Trend Micro indicates this virus &
Security firm Sunbelt Software Distribution says it has discovered a very dangerous new 'kidnapping' malware that is capable of 'kidnapping' even PC. Unlike other types of
Storm Worm was 'honored' to the most dangerous botnet worm in 2007. However, security experts identified it in 2008 that the Storm worm will be hard to hold. A new worm called
People who use online banking services should be cautious with new viruses appearing on Windows that can steal account login information. Known as a 'rootkit' on websites created
Security firm Fortinet has just warned of a toxic worm that attacks SymbianOS phones, but Nokia is an example. The worm is called SymbOS / Beselo.A! This worm spreads over mobile
MSN Messenger's instant messaging service network is currently undergoing a new wave of attacks from the dangerous trojan IRCBOT-RB. IRCBOT-RB Trojan is often distributed through
Beginning to appear on the 28th day of the lunar calendar, a strong outbreak followed and is still spreading, the next version of the Gaixinh virus named W32.LotterYM.Worm has
After 13 hours of 'pause', the Storm poison continued to violently bombard the world's Internet users. This time, its 'victim bait' is the American Labor Day and hot women like
A researcher claims that the power of the Storm worm botnet has now overcome the power of IBM's most powerful Blue Gene supercomputer.
The most popular VoIP service provider for Skype users is being attacked by a new worm that spreads through the P2P chat feature of this Internet phone software.
From the end of last week to the present, netizens using chat tools yahoo (IM) fluttering before the arrival of a virus with the speed of infection is rated as the fastest ever and
On the afternoon of October 10, according to the network security center Bkis, the virus destroyed W32.Chir.B@mm data, which infested more than 3,000 computers since September. In
YouTube's 'invite friends to watch videos' feature recently has been used by spammers to spread spam with dangerous 'worm' implants.
Within a month, Skype was twice attacked by hackers using Trojans, and the way they used it was a fake software called Skype Defender.
According to the BKIS Center, in October, the number of infected computers in Vietnam reached a record number - 3,799,000. The number of new viruses that appeared in the month of