SMS becomes a trojan spread tool
Hackers are using text messages via mobile phones to entice users to access a malicious website to build the 'zombie' network. This is the content of the warning message that
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
Hackers are using text messages via mobile phones to entice users to access a malicious website to build the 'zombie' network. This is the content of the warning message that
Experts say spammers are turning to the trend of using images to replace documents to bypass spam filtering tools.
Security experts are now warning users of a new trojan hidden in Microsoft Word files that are spreading widely through a spam campaign. The Kukudro-A trojan often falsely
Security experts have discovered a new malware masquerading as software that 'sniffs' pirated Windows versions of Microsoft. According to the classification of expert Graham
In this article, we only introduce some 'familiar' viruses for home users. Some types are almost 'extinct' because they cannot keep up with the development of computers, the
Security firm Sophos has just released a list of the Top 10 most dangerous viruses in June 2006. Accordingly, the Nestky-P virus continues to dominate the first place in this
Virus programmers have 'invented' a virus called Gattman that targets a widely used analytical tool among anti-virus researchers.
The 27 new viruses, including the first two rootkit installation viruses in Vietnam, are general information about the virus situation in June. The above information is available
Computer users in Asian countries have been warned about 26 lines of computer viruses that are deep within RONTKBR.GEN spreading throughout the region via email.
A worm is spreading very fast on the Internet but is not intended to infect users. In contrast, it only takes care of disabling all security tools that hit the road.
With beautiful images of hearts and flowers with a link appearing on Yahoo Messenger window from your nick chat, the virus originating in the country has caused many computer users
Software engineers from Microsoft have just released a tool to prevent the exploitation of Internet search mechanisms to send spam. This program called Strider Search Defender
A new Trojan program is so clever that many security experts have called it a 'new chapter' in the fight against malware. With the name Rustock (according to Symantec) or
Viruses, worms, and Trojans are dangerous programs that can destroy your computer and information on your computer, slow down the Internet, and use your computer to distribute them
All of the most popular anti-virus tools are now available to 80% of new malware recently. This awe-inspiring information was made by AusCERT, Australia's Emergency Response Task
On July 17, Microsoft released a warning message about the virus via the Web Security Blog. The report said the PowerPoint virus was distributed primarily through the path
UK-based SurfControl has issued a warning about the emergence of a new trojan forging the latest version of Google Toolbar. The trojan is spread primarily by a fake email path
Security firm McAfee yesterday discovered a fake trojan as an add-on for the Firefox browser to break into users' systems.
The following 2 computer worms belong to cyclical, dispersal operations on a fixed day every month. They are extremely dangerous because when the data is destroyed by these two
Experts from security firm Sophos have issued a warning to Internet users about a Trojan discovered on July 27, 2006, disguised as pictures of a Russian girl looking for love.