malware

An Overview of Threats Against Companies in This Year 2014
Security

An Overview of Threats Against Companies in This Year 2014

The number of companies who become victims of cyber attacks are rising on this year. Kaspersky Lab Research and B2B International shows 91% of companies surveyed have been victims of cyber attacks at least once within past 12 months, while 9% Others were targeted attacks, ie planned attacks that aims to infect network infrastructure company or organization. Breadth of digital devices used in many companies has created ideal conditions for…
Beware of Four Signs PC|Laptop Already Infected by Virus
Tips Tricks

Beware of Four Signs PC|Laptop Already Infected by Virus

Do not underestimate little suspicion on your notebook. If you find the notebook takes much longer when opening a programs/ ​applications, it is better immediately bought to the nearest service center to analyze and addressed more accurately. One of the little suspicion above can be caused by many factors, can be due to viruses or notebook just need to upgrade from too many applications that are installed when starting up.…
Norton 360 Version 6.0 Performance Review, Protection Inside and Outside
Software Reviews

Norton 360 Version 6.0 Performance Review, Protection Inside and Outside

In addition to fortify your system from the threat of cyber criminal action, protective PC today also need to equip themselves against the threat from inside. Norton 360 tries to take that role. Protect your system from cyber crime threats, such as malware, spam, and phishing, should already a must for every PC user. As a result, antivirus packages combined with anti-spam, anti-phishing and parental control seemed to have become…
How to Secure Online Transactions? Tips for Securing and Vulnerabilities
Computer Forensics

How to Secure Online Transactions? Tips for Securing and Vulnerabilities

Can not be denied, the number of users online transactions each year continues to increase. Harris Interactive survey conducted in February-March 2012 said there was 57 percent of Internet users who manage bank accounts online and make online shopping. Of these, about 31 percent admitted they store data banking on the hard drive. Therefore not surprising that banking information is very tempting targets for cybercriminals. The target was none other…
Beware of New Scam on Facebook
Security

Beware of New Scam on Facebook

Beware of scam a new way to staking your Facebook account. Fraud is happening on Facebook at this time gives the notice to register your account activity to be encrypted by the Facebook team before June 15, 2012. The content announcement of these scams was also given the lure that Facebook is doing self-protection against scam attacks from Sopa (Stop Online Piracy Act) and PIPA (Protect IP Act) laws. Then,…
Useful Security Tips from The Top IT Experts in World
Special

Useful Security Tips from The Top IT Experts in World

Learning from mistakes makes you getting smarter. Moreover, if existing errors coming from the professionals expert. IT professionals can get caught on tracks of cybercriminals. However, from there they can share useful lessons for all computer users. CnwinTech asks some leading IT experts about their experiences while connecting to the Internet. Their experience could be valuable lessons for Internet users. CnwinTech does not expect to get so many honest answers…
Duqu Trojan Use an Unknown Programming Language
Hacking & Cracking

Duqu Trojan Use an Unknown Programming Language

Sometime later, Duqu Trojan increasingly popular as a dangerous malware targeting intelligence. Duqu was first discovered in September 2011. However, according to Kaspersky Lab, the Duqu trace has been tracked since August 2007. Kaspersky Lab found that Duqu Trojan written in a programming language that is not known. Duqu a sophisticated Trojan that was created by the same people who make Stuxnet. This malware has a goal as a system…
WIN32/OLMASCO.R, Youngest Malware TDL4 Families
Security

WIN32/OLMASCO.R, Youngest Malware TDL4 Families

After appearance of the newest version last July, where TDL at that time had been detected by ESET and known by Win32/Olmarik, seems still evolving. ESET researchers specifically examined and traces TDL 4 malware consistently, and in that time period, there are phases of the appearance new variants TDL 4. Latest phase is identification of appearance new variants malware Win32/Olmasco.R TDL 4 which has been developed in some parts, especially…
TDL 4, Dangerous TDSS Botnet Generation 4
Security

TDL 4, Dangerous TDSS Botnet Generation 4

TDSS botnet is now come with latest of 4th generation variant, which is more dangerous. Malware that spreads widely through the Internet and other devices such as flash disk is no longer an application that came once and then dies. Malware is also regeneration by always appearing in new forms and variants that stronger, more sophisticated. TDL 4 is one of a botnet TDSS the 4th generation. The rise of…
Simple, Smart and Strong from Avira 2012
Internet

Simple, Smart and Strong from Avira 2012

In early October ago, Avira has announced the presence of Avira 2012 that carries focus on protecting security of home users, small business and enterprise. Major changes occurred in this 2012 version, especially the increase of user interface, installation process, and level of automation in detecting and virus/malware removal, as it also increases the performance of system resources as well as new virus/malware detection that not yet known. Simple With…
Back to top button

Adblock Detected!

If you enjoy our content, please support our site by disabling your ad blocker or whitelisting us. We use ads to keep our content happy and free.