The Latest in IT Security

Posts Tagged ‘security programs’

When I was at school (many, many years ago.) a teacher once told me that if someone copies you, it’s a sign of flattery. Well, right now there are numerous “companies” copying us, but we are far from flattered.For some time now, rogue security programs have been trying their hardest to look just like Microsoft […]

Read more ...

Kent knows that you can better scan and clean an infected PC’s hard drive by not booting from it. He asked the Antivirus & Security Software forum if it’s better to boot from a Linux CD and run security software from that, or to remove the hard drive, and attach it as a secondary drive […]

Read more ...

Here’s a quick update on the Mac OS X malware landscape, a rather hot topic this month. May started off with the announcement of the DIY malware kit Weyland-Yutani BOT. This news was shortly thereafter dwarfed by numerous reports of fake (a.k.a. rogue) security software for the Mac; names include Mac Defender, Mac Protector, Mac […]

Read more ...


Categories

SATURDAY, MAY 04, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments