Selasa, 25 Agustus 2009

Protect yourself from Conficker

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction. If you are an IT professional, please visit Conficker Worm: Help Protect Windows from Conficker. On This Page ...
Continue Reading...

Stop Win32/Conficker from spreading by using Group Policy settings Notes

Important Make sure that you document any current settings before you make any of the changes that are suggested in this article. This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the...
Continue Reading...

Senin, 17 Agustus 2009

AppleScript.THT Trojan Horse New OS X Trojan Horse in the Wild SecureMac Security Advisory

Security Risk: Critical SecureMac has discovered multiple variants of a new Trojan horse in the wild that affects Mac OS X 10.4 and 10.5. The Trojan horse is currently being distributed from a hacker website, where discussion has taken place on distributing the Trojan horse through iChat and Limewire. The source code for the Trojan horse has been distributed, indicating an increased probability of future variants of the Trojan horse. The Trojan horse runs hidden on the system, and allows...
Continue Reading...

How Computer Viruses Work

Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become. For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back...
Continue Reading...

Minggu, 16 Agustus 2009

Windows virus infects 9m computers

The number of Windows computers infected with the new "downadup" worm – also known as "Conficker" and "Kido" – has exploded to almost 9 million worldwide, from roughly 2.4m last Thursday, according to the computer security company F-Secure.The growth in the number of infected machines – which the company's researchers called "just amazing" –...
Continue Reading...

The 10 faces of computer malware

The complexity of today's IT environment makes it easy for computer malware to exist, even flourish. Being informed about what's out there is a good first step to avoid problems. With all the different terms, definitions, and terminology, trying to figure out what's what when it comes to computer malware can be difficult. To start things off, let's...
Continue Reading...

Scam Antivirus App Spreads Malware

Web users have been warned about a new scam that posts fake product reviews in a bid to encourage people to buy a rogue security application called Anti-virus-1. The app is one of a number of bogus security products which promise to provide protection against the latest online threats, but instead have been designed to spread malware or hold users' PCs to ransom. But if you use the internet to research Anti-virus-1, it's possible you'll find a number of glowing reviews, because the tool is posting...
Continue Reading...

Conficker virus activates in a bid to aid cybercriminals

The Conficker virus, which has infected millions of computers around the world, is finally activating itself in a bid to become a money-making machine for cybercriminals. Infected machines have started to update themselves and download a fake anti-virus program aimed at tricking users into paying out for useless security software, security researchers said. The virus may also be destined to be used by its cybercriminal creators to send millions of spam emails and steal passwords from infected...
Continue Reading...

New Service Provides Malware, Virus Protection for Websites

ChattahBox)—Websites are forced to navigate an ever-increasing battlefield of unseen enemies, namely damaging malware, botnets, trojans and viruses that have the potential to land websites on malware blacklists. Website owners finding themselves victims of malware attacks oftentimes receive a further hit, resulting in loss of reputation and business...
Continue Reading...

Jumat, 14 Agustus 2009

Macro Virus

A macro virus is a computer infection written in macro language, which is commonly built into word processing applications. In general, macros is a series of commands and executions that help automate specific tasks. Regardless of how they are created, they must be executed by a system able to interpret stored commands. Some macro systems are actually self-contained utilities while others are built into more advanced applications that allow users to easily repeat a sequence of commands or enable...
Continue Reading...

Macro Virus Protection in the Microsoft Office Line

The Microsoft Office programs are the most well known and widely-used programs in the world. They are also the most vulnerable targets for macro virus infection. One could easily blame Microsoft for not doing anything to prevent the virus threat; however, to do so would be to overlook the efforts that the software giant has made to diminish these...
Continue Reading...

What is MACRO Virus

A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Melissa virus vir...
Continue Reading...

Kamis, 13 Agustus 2009

Removal Tools

Malicious Code has become increasingly complex and infections involve more system elements than ever before. Symantec Security Response has developed tools to automatically conduct what would often amount to extensive and tedious manual removal tasks. If your system has become infected, the tools listed below should aid you in repairing the...
Continue Reading...
 

at videa Copyright © 2009 WoodMag is Designed by Ipietoon for Free Blogger Template