Protect Your Computer System From All Forms of Malware
Improve Web Browsing Security and Speed by Using Alternative DNS Servers
Did you know that one simple change to the DNS settings on your router and/or computer might improve both your web browsing security and speed? In this article, we'll show you how to make the change to an Alternative (and free) DNS provider.
Facebook Security - How to Tell a Facebook Friend from a Facebook Hacker
Did your Grandma just post a Facebook link for Shocking Sexy Pics of Britney Spears? Maybe that's how your granny rolls, but chances are it's the hacker who just pwned her Facebook account. Here are some tips to help you tell the difference between a Facebook friend or foe.
Why Your Child's PC is Full of Malware and What to do About it
Has your child's computer become infested with malware? Learn how to keep them from trashing it and what to do if it's already too late.
How to Test a Suspicious Link Without Clicking it
Does that link look infected? Want to find out how to check the safety of a link without actually clicking on it? Here's how:
Why You Need a Second Opinion Malware Scanner
Your virus scanner says everything is OK, but your computer is acting very strange and won't let you open any files. It's time for a second opinion malware scanner to see what your antivirus software might have missed.
Is Ransomware Holding Your Computer Hostage?
Did your computer just pop up a message that won't go away? Is it demanding that you pay a fine or a fee in order to regain control of your computer? You've just become a victim of Ransomware.
How to Protect Your Computer From Flame and Other Types of 'Super Malware'
There is a new class of 'super malware' on the rise: Flame, Stuxnet, and others are making themselves known for their complexity and motives. Let's find out what you can do to protect your computer from super malware attacks.
5 Network Security Tips for Business Travelers
Before you head out on your next business trip check out these 5 tips on how to not get hacked
Your Botnet Questions, Answered
Overview of bots and botnets. How big is the botnet problem and what are the signs that your PC might be compromised and be a zombie in a botnet.
Is Your Brand New Computer Pre-infected With Malware?
Could your brand new computer already be infected with malware before you even get it out of the box? The answer may be yes. Learn what you can do to detect an infection on your new computer.
The Shadowy World of Malware Affiliate Marketing
Right now, hundreds of thousands of infected computers are being sold into slavery without their owners or their anti-virus software knowing it. Meanwhile, the bad guys are laughing all the way to the bank. Let's pull back the curtain and delve into the shadowy world of malware affiliate marketing.
Should you be Afraid of Scareware?
Should you be afraid of Scareware? The only thing you have to fear... is not knowing what to do about Scareware. Let's bring it out into the light where it's not so scary.
How to Protect Yourself From Clickjacking Attacks
Oh SNAP! You just got Clickjacked!! Learn more about clickjacking and find out how you can avoid getting your clicks jacked.
Serious Vulnerability Found in PDF Files
A security researcher has identified a flaw in PDF files which can be exploited to take complete control of a Windows XP system
What To Look For In Antivirus Software
A description of the various features and functions commonly found in antivirus software so that you can understand their use and know what to look for when making an antivirus software purchase
Free Antivirus Tools and Utilities
Free software to help you detect and block viruses, trojans, worms and other malware and also to clean-up any infections that may slip into your computer system.
Scob Attack Steals Credit Card and Financial Information
A mysterious new threat was discovered which has managed to infiltrate well-known popular and popular web sites with malicious code which causes an infected computer to send credit card information and usernames and passwords for financial data to a web site where it can be retrieved by the attackers.
Why You Need an Email Exploit Detection Engine
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Email security tools must evolve in the same way if such threats are to be blocked before they can cause harm...
Defines guidelines for effectively reducing the threat of computer viruses on the organization’s network.
One Virus Engine Is Not Enough
This paper studies a number of anti-virus engine tests which reveal that each virus scanner presents its own strengths and weaknesses. As no single anti-virus engine can fully protect against all possible threats, this paper examines how simultaneous use of more than one virus engine can achieve greater security than is technically possible when relying on one anti-virus engine alone.
Anti Virus Software: Norton, McAfee, Trend Micro, or Hauri?
In this paper four of the leading antivirus software solutions are tested side by side in order to determine which one provides the best overall protection.
The Norman Book on Computer Viruses
The Norman Book on computer viruses covers all aspects of modern computer viruses, from what types of viruses exist, to how they are created and distributed, with a final chapter on how to protect your systems against viruses.
Sandbox II : Worms and Viruses
Last year I presented how a simulated computer, which is integrated inside the scanner engine, can detect viruses based on actual performance. I demonstrated regular file replication for regular Win32 PE infectors. However, regular file replicating viruses do not pose the biggest threat – worms and viruses spreading through the Internet do...
Windows Scripting Host - disabling .VBS association
Windows Scripting Host (WSH) is a part of some of Microsoft's 32 bits operating systems, or is installed when certain Microsoft programs are installed. WSH may be used to run Visual Basic Scripts (VBS) to automate some actions which are to be performed frequently, and could thus be a useful tool. However - WSH are also used by some virus authors to perform malicious actions on computers.
Protecting your network against email threats
This white paper describes various methods used by email viruses and worms to penetrate a protected network. Such methods include attachment files containing harmful code, social engineering attacks, crafted MIME headers, malicious use of HTML Script and similar technologies...
Why anti-virus software is not enough
This white paper explains why anti-virus software alone is not enough to protect your organization against the current and future onslaught of computer viruses. Examining the different kinds of email attacks that threaten today’s organizations, this paper describes the need for a solid server-based content-checking solution to safeguard your business against email viruses and attacks.
ChannelWeb Exclusive News
Most malware is targeted at Microsoft Windows-based computer systems. However, Unix and Linux servers that act as file shares for Windows systems can still harbor malware. McAfee has now released LinuxShield to help detect and clean viruses and other malware from Linux servers.