Important criteria for antivirus programs
There are many antivirus programs (CTCV), each with its own strengths and weaknesses. Most CTCs are built based on some fundamental criteria, which is also the basis for helping
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
There are many antivirus programs (CTCV), each with its own strengths and weaknesses. Most CTCs are built based on some fundamental criteria, which is also the basis for helping
Spyware is becoming more dangerous and sophisticated but users still cannot take the most basic measures to protect themselves. Recent statistics show that nearly 30% of US
Cybercriminals are attacking computer users with a new dangerous program, hiding in the form of an updated version of the popular Internet phone application Skype launched late
Security firm F-Secure has warned Symbian mobile phone users about the latest variant of Commwarrior, Commwarrior.C, which can be infected via Bluetooth, MMS and MMC memory cards.
It's not always that 'money' is true! This series of free software and utilities introduces you to good products.
A security company has just warned of a new computer worm that is spreading strongly through AOL's AIM instant messaging application and causes more damage than imagined.
Virus creation experts always take advantage of hot news events to make the opportunity to spread malicious code. The trojan called Naiva.A is currently infected in the form of an
Security experts have warned about a new worm that has not been named in the instant messaging system (IM). It is a mixture of unwanted software, including rootkits, tools to
According to research by Cybertrust security organization, hackers are currently following a tendency to conduct small attacks rather than attacks to destroy the entire system.
According to Israeli security expert Andrey Bayora, by adding some data he called 'Magic Byte' to a dangerous file, an attacker could bypass many virus detection systems.
British security firm Sophos has recorded a record number of 1,685 new variants in just 31 days, bringing the total number of worms to 112,142. However, the 10 most dangerous
A virus has been discovered that Microsoft listed as the most destructive product ever. The virus was discovered by McAfee in the afternoon of October 31.
Security experts have just discovered a category of computer worms that attack through instant messaging programs MSN Messenger capable of sending messages in the language used on
Security firm Sophos has just discovered a completely new computer worm capable of stealing users' Yahoo! Mail or online game account login information.
According to recent surveys, most IT managers believe that spyware (spyware) is the number one security threat today and therefore, spyware protection is one of the top priorities.
The list of 10 most dangerous 31-day virus variants of security firm Sophos shows that Netsky.P continues to dominate, although many experts predict August will be Zotob's month.
Hackers have begun sending e-mail messages titled hot Katrina disaster in the US to trick users into accessing dangerous websites.
Finnish security firm F-Secure has developed and launched a security program for mobile phones to help users fight phone viruses that are on the rise.
Experts at SophosLabs lab - a virus and spam analytics research center of Sophos security company - have just announced a new type of trojan capable of preventing access to all
A new pseudo-worm into the free version of Lucasfilm's game Knights of the Old Republic II has the ability to switch users from Google to a similar page.