Researchers at Pennsylvania State University say they can block the spread of self-propagating worms on corporate networks while keeping infected machines online so they can continue performing their ...
When Gidi Cohen started Skybox Security three years ago, he made a commitment to manage security risk more efficiently than other firms were providing for the enterprise community. “The IT community ...
The No. 1 offender to Canadian’s PCs in the first half of 2009 was Win32/ZangoSearchAssistant, adware that victims probably don’t even know hit them, according to a recent security report from ...
Network Chemistry, a provider of RF (radio frequency) security solutions, announced Monday that new worm-detection capabilities have been added to its RFprotect Wireless Intrusion Protection System.
Like other malware, the worm known as Conficker or Downadup is a blended threat, relying upon a variety of attack vectors, which range from brute-force password guessing to hitching rides on USB ...
Microsoft released the latest volume of its Security Intelligence Report (SIR) Monday, a semi-annual study evaluating the security threat landscape and malicious and unwanted software, based on data ...
Colleges in Georgia, Massachusetts, Virginia, and elsewhere reported being hit Tuesday by repeated network-intrusion attempts -- up to 90,000 within a few hours at one university -- that ...
Computer virus attacks are up dramatically from 2,400 in 1995 to more than 80,000 in 2002. It seems that almost every week, there’s a new, threatening virus. Now the Sasser worm — which could in fact ...
Widespread use of security patches seems to have minimized the danger that could have been wreaked by the Code Red worm. Network administrators and security experts feared that the worm would bombard ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. The first sign of computer worm activity dates back to ...
A new worm that attacks Linux Web servers has compromised more than 3,500 machines, creating a rogue peer-to-peer network that has been used to attack other computers with a flood of data, security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results