Bogus installs expose U.K. users to malware

Security-related tatistics from security vendor Webroot suggest malware distributors are increasingly using "passing off" techniques to get their programs on to the PCs of U.K.-based users.The idea of passing off, packaging malicious functions

Share on LinkedIn Share with Google+ Comment on this article Published on: November 15th, 2007 John E Dunn

Rising malware pave way for security ‘white-list’

Two reports out this week on the State of the Union security-wise, and, as you might have expected, there are some divergence in the conclusions. They’re also complementary in a way, and the

Share on LinkedIn Share with Google+ Comment on this article Published on: September 16th, 2007 Dave Webb

Trojan disables MS Anti-spyware

A soft spot on the underbelly of Microsoft Corp.’s Anti-Spyware program, now in its first beta, has been discovered and exploited by the BankASH-A Trojan, discovered Wednesday by Sophos Inc. This Trojan lies

Share on LinkedIn Share with Google+ Comment on this article Published on: February 10th, 2005 Rebecca Reid

F-Secure Corp.

Experts agree: 2004 was the best of times, and the worst of times for those concerned about IT security. It was a year with high-profile arrests of virus authors, and the explosion of

Share on LinkedIn Share with Google+ Comment on this article Published on: December 21st, 2004 Paul Roberts

Experts downplay Phatbot danger

Security experts downplayed the danger of a Trojan horse program named Phatbot that uses peer to peer (P-to-P) technology to create a network of infected zombies for carrying out attacks or spreading malicious

Share on LinkedIn Share with Google+ Comment on this article Published on: March 17th, 2004 Paul Roberts

Teach your children well

As the computer war advances and defensive technology improves, malicious code writers have been forced to get more creative. With end-user trepidation on the rise and more caution used when opening e-mail attachments,

Share on LinkedIn Share with Google+ Comment on this article Published on: May 16th, 2002 Chris Conrath