July 27, 2012
Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for. Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease. Early variants were created and most […]
March 20, 2012
In the beginning months of every year, the people fighting the good fight against internet crime converge upon the Moscone Center In San Francisco. The RSA Conference is an event that brings huge amounts people from around the world together, over 200 sessions, 450 speakers and 350 security-focused exhibitors, for a week to focus on […]
July 28, 2011
Where does your malware come from? How does it get to your computer? It is not like there is some magical, malicious stork that comes and drops off some demented baby into your operating system that makes it join a botnet at knife point. There is no stork, there is no baby. Blue Coat security […]
June 30, 2011
‘Butterfly bot’ kit steals financial information, but its licensing model could ultimately lead authorities to its newest botmasters. A financial-fraud botnet built with the same malware kit used in the now-defunct Mariposa botnet remains active after arrests this month of two Eastern European men who allegedly ran it. Researchers at Unveillance, Panda Labs, and Damballa […]
April 19, 2011
AV-Test, one of the most influential independent labs for testing, certification and comparative analysis of IT security products, as usual, has issued its first report of the year, certifying 17 out of 22 of the Best Antivirus products for Windows 7 in 2011. AV-Test certifies Antivirus or Security Suites that achieve a cumulative score at […]
March 29, 2011
There has been much attention placed on Stuxnet by the world media since it was widely reported in the summer of 2010. As we have seen the evolution of malware from mere annoyance, to organized crime over the years, Stuxnet marks the first known targeted malware attack designed to damage physical property, capable of destroying buildings, […]
March 5, 2011
Today the vast majority of consumer banking and bill payment is done online. Due to the fact that online transactions are growing in volume, malware authors are increasingly focused on developing malicious software designed to steal personal data from infected PCs. A online black market exists where different crimeware packages (Kits for the creation of […]
June 22, 2010
Every Internet user knows the word ‘spam’ and sees it in their inbox quite often. But not everyone knows that years ago the word ‘spam’ had nothing to do with either the Internet or emails.
June 20, 2010
Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.
June 22, 2010
Spyware are small programs that are installed on our system in order to steal our data and spy our movements through the network.
June 20, 2010
Adware “Advertising-Supported”, in other words, these programs are created to show advertising.
See more articles in the archive
Latest news (in Spanish)