spyware - News, Features, and Slideshows
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
By Lucian Constantin | 21 November, 2014 04:35
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
By Lucian Constantin | 20 November, 2014 22:54
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
By Lucian Constantin | 15 November, 2014 03:38
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
By Lucian Constantin | 13 November, 2014 01:53
For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.
By Lucian Constantin | 11 November, 2014 01:24
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTProgram Manager - Integration & SolutionsNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTChief Information Officer - CSIROACT
Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. Read on to find out how you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.
- Spliddit: Algorithms to divide the rent, stuff, or credit fairly between people
- Why is Microsoft updating Windows PCs for a security bug on the server?
- Prices for 4K monitors sink below $500
- Apple's $450 million e-books settlement gets final approval
- Black Friday: Newegg axes prices on laptops, desktops, tablets and more
- Reports: EU taking first step towards breaking up Google
- Double-edged feedback sword nicks Microsoft over OneDrive
- The ups and downs of Microsoft Band
- US man sentenced for hacking POS systems at Subway
- FCC chairman gives no timeline for net neutrality decision
- Connected-home Babel: There's an app for that, startup says
- Flurry of hydrogen fuel cell cars challenge all-electric vehicles
- Mozilla reports flat revenue from Google-Firefox search deal
- Apple delivers another Yosemite beta as WiFi issues persist
- UpCloud bets on storage performance, US datacenter to dent market