Got Apple Quicktime installed on your computer? Uninstall it immediately, says Department of Homeland Security

A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely […]

66 total views, no views today

Continue reading


Bits from Bill Pytlovany: Macs hit by Malware Epidemic

apple hit by malware epidemic

Over the years I’ve attended a number of conferences and panels on what originally was called Spyware and Adware. I think we’ve finally settled on using the term Malware for any kind of spyware, virus, Trojan horse or any kind of unwanted computer invasion. I fondly remember my first conference in Washington DC which included panel discussions like “What is Spyware”.

66 total views, no views today

Continue reading


Department of Justice and FBI Take Down Huge Coreflood Botnet

Score one for the good guys this week as the The FBI and US Department of Justice unleash a powerful and quick take down of the “Coreflood” botnet.

Coreflood was a massive international network of more than two million infected computers; computers that were used to empty bank accounts, score sensitive corporate data and steal untold financial data. This is a huge victory as this particular botnet has been in operation for 10 years.

119 total views, 1 views today

Continue reading


Ask Leo: How do I keep my computer safe on the internet?

askleo

By Leo Notenboom

Virii & Spyware & Worms … oh my!

“Internet Safety” seems like an oxymoron.

It seems like not a day goes by where we don’t hear about some new kind of
threat aimed at wreaking havoc across machines connected to the internet. While
products other than Microsoft’s are certainly vulnerable, anti-Microsoft
sentiment coupled with the massive installed base make Microsoft products an irresistible target for hackers and “script kiddies”.

Here are some things you can, and should, do to stay safe.

70 total views, 2 views today

Continue reading


6 Steps To Remove Malware Completely

exterminate1

Malware can mutate within minutes. If you’re infected, clean it fast and clean it completely.

First and foremost have a solid and reliable detection and removal program installed on your system. I use and recommend PC Matic everyday. It’s my first line of defense. I run PC Matic once a week and let it check for infections while it cleans and updates my system. The latest virus definitions are updated from our server each time I run the program. I know I’m ahead of the curve for detection.

677 total views, 2 views today

Continue reading


Bits from Bill: Twitter Under Attack

bill p

By Bill Pytlovany

No, it’s not under attack by rebel’s in Iran. It’s the same old malware attacks using popular topics or trends on Twitter.

It’s natural as soon as something on the Internet is popular, it will be the target of greedy, bad guys. These days most of the buzz is about Twitter and sure enough Twitter is the new playground for evil tricksters.

31 total views, no views today

Continue reading


Evolution of Malware

It was a cold day in South Dakota (circa 1990) as I entered the Gateway building. Unlike most days, the hustle and bustle of a rapidly growing computer company were missing, replaced by an eerie still and quietness. The security guard shook his head, and said, “The software download server got hit with a virus.” All of production was shut down.

87 total views, no views today

Continue reading


FREE Protection vs Paid Protection from Spyware

There is no doubt that the lines are being drawn for a galactic cyber battle for control over your PC and your desktop. Spyware and adware companies make barrels of money installing their clandestine applications on your PC without your knowledge. Even for an advanced user, typically the most expedient solution is to install an anti spyware product. This article will take an in depth look at the various anti spyware solutions we have seen at PC Pitstop. During this discussion, the reader should refer to our anti spyware graph from our research section.

114 total views, 1 views today

Continue reading