Tuesday, July 23, 2013

Articles Index with click to select

Ads:

Articles Index

Antivirus Software Technology

Threats are abundant with information systems. One nasty virus can cripple your machine, steal your personal information, and infect other devices. Protecting your computer from malware is perhaps the most important aspect of computer ownership. The first step in protecting your system is understanding how antivirus software operate.

iLivid Virus

The iLivid virus presents itself as a tool called "iLivid Free Download Manager." The virus tricks people into thinking that the application will assist with media downloads. Learn more about the dangers of iLivd.

Firefox Redirect Virus

Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus.

Fake Antivirus Software

Fake antivirus software will conduct false virus scans on your computer. Learn how to detect these threats.

What is Sirefef Malware?

Learn about the dangers of Sirefef (ZeroAccess) Malware and how to prevent it.

Website Compromises at UNC Chapel Hill

The first step in solving any problem is first understanding you have a problem. This is particularly true when it comes to managing the problems brought on by website compromises and date breaches.

Bugs, Mice, and Antivirus

So what do computer viruses and real life cockroaches have in common? Nothing really, except the lessons you learn from trying to overcome one can also be applied to the other.

JS.Fortnight Worm

The Fortnight worm arrives in the body of an html-rendered email, redirecting Internet Explorer to porn sites.

Klez Help Center

The Klez virus uses a variety of techniques to fool and aggravate users

BadTrans.B

Tips for removing the BadTrans.B virus and blocking it in email

Common Botnets

A botnet is a collection of compromised (infected) computers under the collective control of remote attackers. The malware on the infected computer is known as a bot, a type of backdoor or remote access trojan (RAT). Here is a collection of the most common botnets.

Stuxnet, Winsta.exe, and Cover-ups

Stuxnet is - without dispute - the most important malware in history. It would be nice if for once the industry (including vendors and journalists) would put their self-interests on hold, would stop trying to save face, and would instead delve into the truth of Stuxnet so at least we have the real facts.

Is Stuxnet Really Targeting Iran?

There has been no shortage of claims that Iran was the intended target of the Stuxnet worm. But the reality is, these claims are completely unfounded. Here are a few of the true facts behind Stuxnet.

2003: Year of the Black Sheep

It seems appropriate that the Chinese dubbed 2003 as the Year of the Black Sheep. Among other things, the sheep is a symbol of untidiness - and from a virus standpoint, the year was indeed a mess.

Conficker: More Conflict than Worm

Barely a week after the 60 Minutes April Fools' Conficker doomsday update failed to materialize, the closely watched Conflicker.C did finally manage an update. And in an ironic twist, the worm itself debunks much of the hype surrounding it.

PowerPoint Zero Day Vulnerability In-the-Wild

Microsoft has released Security Advisory 969136 warning of a newly discovered zero day PowerPoint vulnerability. The flaw impacts PowerPoint versions found in Windows versions of Office 2000, 2002, 2003, and Office 2004 for Mac.

60 Minutes, Conficker, and April's Fool

Is the Conficker worm set to detonate some evil payload on April 1st? According to 60 Minutes, it seems so. Here's the non-FUD behind the Conficker worm.

Winthb 'Virus' Tied to Backdoor Trojans

A family of backdoor and autorun trojans are working together to plague users. One symptom that may appear - the drive volume name and icon may be changed. The more insiduous aspects of the infection are far more silent and may be overlooked when users attempt manual removal.

A Storm of Scary Email

In recent weeks, a rash of spam has been sent that bear much resemblance to the all-too-familiar tactics of the Storm botnet.

What is JS/Psyme (and How to Get Rid of It)

Many users have experienced repeated warnings of infection by Psyme each time they open their browser. Depending on the antivirus in use, the name given in the warning may be any of the following: Downloader.Psyme (Symantec), Troj/Psyme (Sophos), Trojan.VBS.KillAV (Kaspersky), TrojanDownloader.VBS.Psyme (CA),Trojan.Downloader.JS.Psyme (Kaspersky), VBS/Petch.A (F-Prot), VBS/Psyme (McAfee)

What is the Storm Worm?

The so-called Storm worm is actually not a worm, but rather a family of Trojans that typically include a backdoor, SMTP relay, P2P communications, email harvester, downloader, and often a rootkit.

U.Z.A. O/S Eliminator Worm

The so-called "U.Z.A. O/S Eliminator" worm appears to have originated in Maldives sometime in late July or early August 2007. The worm exploits the autorun feature, enabling it to spread from removable USB/thumb drives to other computers.

Freedom / Outlaw Worm

The Freedom 'virus' is a worm that infects local and USB drives, disables access to Task Manager, Registry Editor and other system utilities, and may try to delete MP3 files found on infected systems. Here's how to clean it.

Ransomware: Trojans Demand Money From Victims

Having your computer infected with a virus or other malicious software is upsetting enough. But over the past year, a new type of attack promises to be even more disconcerting. Dubbed ransomware, this new attack infects the system, encrypts the files, and then demands payment from its victims.

Trojan.MeSpam Makes You the Spammer

Instead of relying on bots to do the dirty work, Trojan.MeSpam makes you the culprit. Once infected, every forum post you make, every webmail you send, and every blog comment you leave will also deposit a link pointing to a nefarious website.

No comments:

Post a Comment