|Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.
Software is considered malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. ... View More|
|The best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and that causes that software, when run, to spread the virus to other executable software. Viruses may also contain a payload that performs other actions, often malicious. A worm, on the other hand, is a program that actively transmits itself over a network to infect other computers. It too may carry a payload.
These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads automatically. Using this distinction, ... View More|
|List of New Threats
|Security Essentials 2010
Security Essentials 2010 is a rogue anti-spyware program and is a predecessor of bogus programs XP Internet Security 2010, Internet Security 2010, Vista Internet Security 2010, Antivir 2010, and Vista Guardian 2010.
Security Essentials 2010 is installed onto a user’s computer due to a trojan downloader, mostly found on fake video codec downloads. Once the trojan has infiltrated the computer, Security Essentials 2010 is programmed to begin running at Windows startup, performing a fake scan of the computer and reporting imaginary threat results in order to frighten the user into purchasing the full version of Security Essentials 2010. The bogus program Security Essentials 2010 is not endorsed or ... View More|
|As malware attacks become more frequent, attention has begun to shift from viruses and spyware protection, to malware protection, and programs have been developed to specifically combat them.
Anti-malware programs can combat malware in two ways:
They can provide real time protection against the installation of malware software on a computer. This type of spyware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming network data for malware software and blocks any threats it comes across.
Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of malware protection is ... View More|
|What is the Flashback Virus, and how can it be removed?
In early April, a Russian security company reported that as many as 600,000 Macintosh computers were infected with the so-called "Flashback" Trojan Horse virus, which originally appeared in the wild in 2011. The virus, OSX.Flashback, initially disguising itself as an Adobe Flash Player installer, allows an attacker to secretly obtain remote access to the system by exploiting a current Java vulnerability (BID 52161.)
On its blog, US security group Symantec writes, "Malware authors have targeted the Mac OS for quite some time; however, the recent OSX.Flashback.K infections indicate a very significant shift to the current threat landscape, which is dominated by malware on the ... View More|
|Anti-VirusBy Daniel M. HeadSeptember 7, 2014 It’s no fun when your computer is running slow, or won’t perform a task it used to. Sometimes, you might have to call a technical support professional like me, to troubleshoot and repair the problem, but there are a number of very easy steps that you can take to keep your computer running smoothly. That’s what this My first suggestion is to download and maintain anti-virus software on your computer. Yes, this is for your own safety, but it’s also being a good neighbor. If your computer gets infected, it can be a door into your entire home or work network, which the bad guys can use to compromise more computers. Your computers can even be used to attack other ... View More|