| Wednesday December 2, 2009 |
Facebook Revamps Privacy Approach Yet Again By Kenneth Corbin - December 2, 2009 Social networking leader moves away from network-based approach to privacy, gives users more precise control over what's shared. 12/02: Voterai-A Attacks Through Removable Storage Devices By eSecurityPlanet Staff - December 2, 2009 The Voterai-A virus spreads by copying itself to removable storage devices. 12/2: Trojan.FakeAV!gen9 Trojan Utilizes Packers By eSecurityPlanet Staff - December 2, 2009 This relatively low-threat Trojan is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software. It targets only Windows OS, from Windows 95 on up. McAfee Locks Down Removable Devices By Larry Barrett - December 1, 2009 Security software-maker serves up unified, end-to-end security options for the enterprise. 12/1: AntivirusSystemPro Reports False or Exaggerated Threats By eSecurityPlanet Staff - December 1, 2009 The misleading application may prevent a user from running any other executable, claiming that it is infected and asking the user to register the misleading application. 11/30: Packed.Generic.271 Targets Encrypted Files November 30, 2009 Packed.Generic.271 is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal them from antivirus software. 11/25: Bloodhound.Exploit.286 is Heuristic Detection November 25, 2009 Bloodhound.Exploit.286 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer 'Style' Object Remote Code Execution Vulnerability. Bug Confirmed in Older IE Browsers By Stuart J. Johnston - November 25, 2009 Microsoft confirmed that a security hole in older versions of Internet Explorer is a real threat that the company is taking seriously. Get Ready for Windows 7! Pros and Cons? Learn What Our Experts Think Download Free eBook Now. Click Here. | Interested in placing your TEXT AD HERE? Click Here 11/24: Suspicious.Stealers Detects Without Sigs November 24, 2009 Suspicious.Stealers is a detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers. 2009's Malware May Reveal 2010's Threats By Sean Michael Kerner - November 23, 2009 In 2009, new malware mechanisms have emerged and platforms beyond Windows have increasingly been targeted. | |
All newsletters are sent from the domain "internet.com." Please use this domain name when configuring e-mail or spam filter rules, if you use them.
No comments:
Post a Comment