Video Screencast Help

Endpoint Protection (AntiVirus)

Results for Endpoint Protection (AntiVirus)

The commercialization of every aspect of online fraud has been a growing trend over the last few years. [1] This commercialization has now hit the drive-by download market. A new subscription service that automates drive-by downloads is now available ...
Blog Entry by Liam O Murchu | 26 May 2006 | 0 comments
t was a quiet Thursday night on May 11, 2006, when I decided to try my hand in a poker tournament on the Ladbrokespoker.com Web site. Ladbrokespoker.com is the busiest poker site in Europe with regular traffic of more than 5,000 players, usually reaching ...
Blog Entry by Stephen Doherty | 24 May 2006 | 0 comments
Public-key cryptography enables transactions among those parties who haven’t previously agreed upon a symmetric cryptographic key. To make public-key cryptography work, one needs a mechanism for binding a person’s public key to their private identity ...
Blog Entry by Zulfikar Ramzan | 23 May 2006 | 0 comments
It is so great to now have the opportunity to choose how to receive your adware. In the past, drive-by downloads were targeted exclusively towards Internet Explorer (IE) users and indeed, many people changed to Firefox or Safari browsers specifically ...
Blog Entry by Liam O Murchu | 22 May 2006 | 0 comments
Within the last 24 hours, Security Response has discovered a newattack which exploits a previously undocumented vulnerability inMicrosoft Word. The malicious Microsoft Word document is emailed to thevictim as an attachment, and upon being opened, it ...
Blog Entry by Symantec Securi... | 19 May 2006 | 0 comments
Phishing is an attempt by a third party to solicit confidential information from an individual, group, or organization, often for financial gain. The phishers may then use the information to conduct criminal activities for profit. A typical phishing ...
Blog Entry by Zulfikar Ramzan | 18 May 2006 | 0 comments
When we talk to customers about the future malware landscape, many often wonder when mobile device threats are going to arrive. They are surprised to learn that threats for mobile devices already exist, aren't just proof of concepts, and are ...
Blog Entry by Eric Chien | 17 May 2006 | 0 comments
So, it's started. We are starting to see the arrival of Linux in the cellular device/handset market (to be honest, it's been a year or two since they first emerged, but they are now starting to become more prevalent) and along with them the ...
Blog Entry by Ollie Whitehouse | 16 May 2006 | 0 comments
by Frederic Raynal This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses. Part two continues the discussion of ...
Article by Anonymous | 15 May 2006 | 2 comments
Being in this business, we are often called upon to help clean up the computers of families and friends. In the past I have had many friends who thought they had a virus, but usually it was just some other system anomaly. Times have changed though, ...
Blog Entry by Eric Chien | 15 May 2006 | 0 comments