IT security and control firm Sophos is warning Internet users not to be tempted by a malicious spam campaign that is distributing a Windows Trojan concealed as a game for the popular Apple iPhone. Read the rest of this entry »
IT security and control firm Sophos is warning Internet users not to be tempted by a malicious spam campaign that is distributing a Windows Trojan concealed as a game for the popular Apple iPhone. Read the rest of this entry »
BitDefender, a global provider of award-winning anti-virus software and data security solutions, announced today the launch of BitDefender Total Security 2009, in South Africa.
The new security solution from BitDefender provides the ultimate proactive protection for PCs by combining advanced protection against viruses, spyware, hackers, spam and other e-threats, with minimal impact on system performance. Read the rest of this entry »
Ladies and gentlemen, readers from all corners of the globe… Today I was on the border of crossing over into a new career of… Well… Uhm… absolutely anything where I would not need to deal with PC’s! I can almost guarantee that most of you have either experienced or know of someone that has installed software on their PC, thinking that it is an Anti-Malware program but turns out to be malware itself. Antivirus 2009, Internet Security Deluxe, Micro Antivirus 2009… There are a few… Read the rest of this entry »
Panda Security’s anti-malware laboratory has located two spoof P2P application installers that are loading Lop adware on users’ systems.
By a show of hands, how many of you are running a home office? Let’s broaden that search; how many of our loyal readers work in a small office environment? Companies of such a size usually will not have an IT support team, unless of course, it is an IT support company. Now the beauty of these small environments has to be the ease of manageability. It takes almost no knowledge to set up a small network of 3 or 4 PC’s. The bonus is if you have a brother, sister, next door neighbour, friend… actually anyone who’s inner-geek can be exploited to sort you out. You don’t well here are 4 major things to keep in mind, for yourself. Read the rest of this entry »
Let’s for a moment visualize a virtualized desktop environment. An operating system offering a type 2 hypervisor is acting as the primary operating system in a desktop virtualization implementation. This could be Linux sporting Xen or KVM. It could be Windows running something like Parallels or Virtual PC. It could be Mac OS running Fusion or Parallels. One person could be using the resources of all of these virtual machines or it could be an environment for a workgroup. The key question is where should the anti-virus software run and why? Read the rest of this entry »
If any of you are anything like me then not too long after getting a new gadget, you will want to tweak and tune it. Problem is that very often this may cause many a blue screen error message, in the case of a PC. Here are 10 things that you can safely tweak!
Flash drive infections usually involve malware that loads an autorun.inf file into the root folder of all drives (internal, external, removable). When the removable media is inserted, autorun looks for autorun.inf and automatically executes a malicious autorun.bat file which calls wscript.exe to run autorun.vbs on your computer. Read the rest of this entry »