Tag Archives | Malware
Security and Data Centers

Security and Data Centers

Twenty years ago, I ran a small group in a large corporation’s subsidiary, which developed firewall and virtual networking gear. In those days, most people were beginning to discover what the Internet and the World Wide Web were. That security was required for the Internet was not well recognized. It was inconceivable for many that [...]

Read full story Comments { 0 }
Business Phones Security

Business Phones Security

Threats to VoIP and What to Do about Them In the Internet age, businesses have learned about the importance of digital security. Sometimes, we forget that our phone systems are now internet-based and are therefore subject to many of the same security threats that we hear about on a daily basis – malware and viruses [...]

Read full story Comments { 0 } Download Whitepaper

Trapping Malware With Honeypots

Hackers systematically scan the Internet for vulnerable systems with the help of self-spreading malware. On average, accessible systems are the target of an attack every three minutes whereby security loopholes are often exploited. In order to protect systems better, cyber experts study their opponents’ work. One possibility is the use of “Honeypots.” These are computers [...]

Read full story Comments { 0 }
Google… paranoid, or proactive?

Google… paranoid, or proactive?

From alerts about malware to blocked websites in China, Google sometimes comes off as a bit paranoid. Today Google reinforced this image, with security warnings about state-sponsored attacks.   Google said the warnings will appear for a “subset” of users who Google believes “may be the target of state-sponsored attacks.” When activated, a pink bar [...]

Read full story Comments { 0 }

SMCI Widget and growsmartbusiness.com by Network Solutions Still Serving Malware, Part 1/2

by Wayne Huang, Fyodor Yarochkin, NightCola Lin, Chris Hsiao of Armorize.   Screenshot 1 The beginning of this year saw mass Web hosting compromises across numerous hosting providers; thousands of websites were compromised via vulnerabilities in shared hosting providers and as a result, were serving malware. We thought eventually everything would be cleaned up and [...]

Read full story Comments { 0 }

Comparing Email Management Systems that Protect Against Spam, Viruses, Malware & Phishing Attacks

Email is absolutely critical to the health and efficiency of business-critical applications. Proper management and protection from the growing array of threats that impact it is an increasingly vital initiative. Systems designed to protect email systems and users from spam, viruses, malware and other threats must be extremely effective. They must operate with virtually no [...]

Read full story Comments { 0 } Download Whitepaper

Tek-Tips of the Week

Top Stories Battle for Open Source’s future got a well deserved nod from our industry’s leader in software integrity, Coverity: "Open source developers are actively improving software.  In 2009, the number of Rung 1 certified projects increased 32 percent from 2008 and doubled on Rung 2 in the same time period. OpenPAM, Ruby, Samba and [...]

Read full story Comments { 0 }

On 9/11 Cyber Attacks Have Become Almost Mundane

The news, search, social networks — on 9/11 where can you go online that is not under attack? Here’s a recap of just a few of the latest exploits.  And this is just smidgen of what is happening. Attacks have become so frequent that they have become almost mundane, as boring as any other reporting of [...]

Read full story Comments { 0 }

Patch Tuesday: Five Critical Severity Ratings

Microsoft has released five new security bulletins in the September version of Patch Tuesday. All bulletins are rated with a Critical severity rating. This month, Windows 7 is not an affected product for the bulletins and vulnerabilities. All bulletins are not publicly known at this time. The most important bulletin to install first is MS09-048. [...]

Read full story Comments { 0 }

The Top 10 Malware Sites As Indexed By Google

Google has found more than 4,000 malware sites with more than 1,700 originating from China.  Of those, Google created a top 10 list that counts the number of compromised web sites that reference it. According to the Google Online Security blog, “All domains on the top-10 list are suspected to have compromised more than 10,000 [...]

Read full story Comments { 0 }