Malware

Stop viewing porn in Internet Explorer.. for now

Read more in my article at Naked Security.


1 sec read

Opinions on Apple Mac security

Read more in my article at Naked Security.


1 sec read

Unpatched Microsoft Internet Explorer vulnerability being actively exploited

Read more in my article at Naked Security.


1 sec read

FTC halts fake anti-virus scans that scammed a million people

Read more in my article at Naked Security.


1 sec read

Talking computer security threats in 2008 and 2009

Read more in my article at Naked Security.


1 sec read

Video of a fake anti-virus attack

Read more in my article at Naked Security.


1 sec read

Promoting the Sophos Security Threat Report

Read more in my article at Naked Security.


1 sec read

More fake anti-virus attacks spammed out

Read more in my article at Naked Security.


1 sec read

Email malware flying high

Read more in my article at Naked Security.


1 sec read

Mac anti-virus support advice disappears off Apple website

Read more in my article at Naked Security.


1 sec read

Apples, viruses and internet snowballs

Read more in my article at Naked Security.


1 sec read

Do you really need anti-virus on your Apple Mac?

Read more in my article at Naked Security.


1 sec read

Sophos wins VB100 award for Windows Vista x64

Read more in my article at Naked Security.


1 sec read

More contract malware spammed out

Read more in my article at Naked Security.


1 sec read

Contract of many disguises contains Trojan horse

Read more in my article at Naked Security.


1 sec read

Conficker worm exploits Microsoft MS08-067 vulnerability

Back in October I warned you about a critical security vulnerability found in some versions of Microsoft Windows.

Known as as MS08-067, Sophos published information about this serious vulnerability and warned of the potential for worms to be written which would exploit the security hole.

Yesterday, we began to receive reports of a new piece of malware (W32/Confick-A, also known as Conficker) that attempts to spread by exploiting this vulnerability.


17 sec read