The Latest in IT Security

Posts Tagged ‘FakeAV’

My colleagues Fabio Assolini and Vicente Diaz wrote two blog posts recently regarding the Rogue AVs for MAC OSX. After executing it on a test machine, and playing with it, I noticed there was some hidden information in the About Window as can be seen below:I was interested by the “Support” information, but it’s only […]

Read more ...

Top AV software vendors are constantly researching and developing new techniques to improve their products and enhance the malware detection capabilities.In contrast to this, people behind FakeAV only pretend to secure the PC with their FakeAV software and disguise their criminal activity behind colorful animations with numerous frightening alerts, infection warnings and, what a coincidence, […]

Read more ...

If you happen to go looking for Chaka Khan information (and come on now, who wouldn’t be doing that) then the first result you’ll see in Google is the Official Chaka Khan website. Unfortunately there’s a message from Google added to the listing: “This site may be compromised”.Google has this to say about that particular […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments