Search Results for: play store malware

Being Big Brother: Monitoring employees’ network activity

Big brother is watching. In today’s security-conscious world, it has become a fact of life. George Orwell coined the term to refer to government intrusion into the private lives of citizens, but the meaning has expanded to include any authority figure. The law recognizes that there are circumstances in which monitoring of others’ activities is permissible or even desirable. In general, employers have a lot of leeway in monitoring what their employees do while on company premises and using company equipment.

Darwinism Meets the Virus and Worm

Viruses are largely a threat that is contained if one has an anti-virus solution. This begs the question of what then is the next big threat in terms of malware code? The answer to that would be the new, and more lethal worms such as Slammer for one. What would happen though if someone with coding talent were to harness the chaotic world of the worm?

Removing Pests from Windows (Part 2)

In this two part article I will discuss pests and potential issues associated with pests that may be encountered within windows. These pests are like parasites of the digital world. These parasites feed off the electronic resources of the host machine, eventually draining the machine to standstill point.

Removing Pests from Windows (Part 1)

In this two part article I will discuss pests and potential issues associated with pests that may be encountered within windows. IT security professionals are faced with these resource and information divulging threats daily and because at his point there is not mature technology to deal with the problem officially it is challenging to remove these pests form the computer or server manually. These pests are like parasites of the digital world. These parasites feed off the electronic resources of the host machine, eventually draining the machine to standstill point.

Threats and your Assets – What is really at Risk?

In this article we will cover some of the most important items you will need to consider when discussing, analyzing, designing or implementing a security posture within your place of business, or perhaps in a company you may be servicing. Considering that threats and their origins are constantly changing… shifting, we need to (as Security Analysts/Engineers) focus on what those threats are, where they originate from and what we can do about them as well as deal with their drift from the norm which was basically from being heavily focused on external threats to being in balance with internal threats. This article covers those details as well as why ‘Defense in Depth’ is so critical. We will also focus on Microsoft products (as well as other technologies) while doing so.

Trojans FAQ

We have all heard alot about trojan horse programs and the threat that they pose to your network's security. This Trojan FAQ sheds some light on what these programs are, what they do, how they can infect your network and suggests measures that could be taken to prevent such infections. You can make sure that you have a good grasp on these malicious programs by browsing through this regularly updated Trojan FAQ which provides the answers to these questions and many others. With thanks to Dancho Danchev for his contributions to this FAQ.

Scroll to Top