Similar Articles |
|
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... |
PC World April 2001 Cameron Crouch & Sean Captain |
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... |
PC World December 11, 2000 Sean Captain |
Security Crusader Punches Holes in Firewalls Gibson's simple Trojan horse tricks firewalls from McAfee.com, Symantec, Sygate, and more... |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
InternetNews April 23, 2004 Ryan Naraine |
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
PC World May 2005 Scott Spanbauer |
It's Time to Update Your Internet Security Arsenal Every tool you need to secure your Windows PC is free on the Internet. Here's where they are. |
PC Magazine December 9, 2003 |
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. |
PC World May 2003 Stuart J. Johnston |
Bugs and Fixes: Fix Your Browser and Shop Safely Yet another patch for Internet Explorer to keep your data secure. |
PC Magazine April 5, 2006 Robert Lemos |
This Man Has a Virus Security software can do little about the most dangerous delivery mechanism of all: the user. |
PC World May 2001 Stan Miastkowski |
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... |
PC World May 16, 2002 Sam Costello |
Fake Xbox Emulator Hid Trojan Horse Host Angelfire removes Web site that secretly downloaded adware... |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
PC World September 2005 Steve Bass |
Hassle-Free PC: Four Tips to Make IE More Secure Add a layer of protection against spyware and other malicious code. |
InternetNews July 28, 2004 Ryan Naraine |
Microsoft: Out-of-Cycle Security Patch Coming Due out next week, the patch will fix a software flaw that led to the Download.Ject malware attack. |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
PC World February 2002 Andrew Brandt |
Privacy Watch: Intruders at the Modem? Wandering the Internet over a cable modem or DSL connection may seem like a joyride, but it could turn into a car wreck if you don't take steps to protect your PC... |
PC Magazine November 2, 2005 Michael J. Steinhart |
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. |
PC World January 24, 2007 Andrew Brandt |
Internet Explorer 7 Is Still Not Safe Enough IE 7 is definitely more secure, but phishing and malicious scripting attacks remain a problem. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC World October 2004 Scott Spanbauer |
Tweak Windows XP SP2 Security to Your Advantage Fine-tune the settings in Microsoft's recently released Windows XP Service Pack 2. |
PC Magazine May 30, 2006 Neil J. Rubenking |
Comodo Personal Firewall 2.0 This sharp-looking free personal firewall outperforms many you'd pay for. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
BusinessWeek March 20, 2006 Stephen H. Wildstrom |
Finally, A Safer Explorer Splitting Internet Explorer from Windows means less convenience. |
PC World November 2000 Stuart J. Johnston |
Java Lets Hackers Attack Your Browser Java security flaws... Money file protection... Trojan horse invades PDAs... |
InternetNews June 28, 2004 Ryan Naraine |
Malware Attack Thwarted but Danger Lurks Critical IE vulnerability remains unpatched. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. |
InternetNews October 3, 2005 Tim Gray |
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. |
BusinessWeek August 30, 2004 Stephen H. Wildstrom |
Windows: Security Is Suddenly Job One By attacking some of the worst security problems in Windows, Windows XP Service Pack 2 could save you a lot of trouble. Bite the bullet and install it -- the sooner the better. |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
InternetNews January 28, 2004 Ryan Naraine |
New IE Download Spoof Found Malicious Web sites could spoof the file extension of downloadable files. |
InternetNews July 27, 2004 Jim Wagner |
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. |
PC World June 2004 Mary Landesman |
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. |
PC World July 2001 |
Letters to PC World Your take on sharing music files, Trojan horses, and online safety... |
InternetNews June 23, 2006 Sean Michael Kerner |
Next-Gen Bank Trojans Are Upon Us Regardless of how much damage they may have done in the past, a new generation of banking Trojans is beginning to appear, and they're game for even more pilfering, according to at least one security researcher. |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
PC World October 2004 Andrew Brandt |
Security Tips: Keep Viruses, Worms, and Spyware Off Your PC Closing the gates to these threats before they infect your system. |
PC Magazine August 19, 2003 Sheryl Canter |
Effective Immunity Viruses keep spreading, and PCs keep getting infected. What can you do to stay secure? |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews July 2, 2004 Susan Kuchinskas |
Microsoft Issues Security Update For Trojan Redmond is urging customers to reconfigure their operating systems right away as it works on bigger patches for IE. |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. |
PC Magazine August 30, 2006 Robert Lemos |
Gone in a Flash Stop your employees from infecting your systems or pocketing your company's intellectual property. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
PC World April 2004 Scott Spanbauer |
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. |
BusinessWeek February 25, 2010 Rich Jaroslovsky |
Browser Wars: The Sequel Chrome, Safari, IE 8, Firefox, Opera... there's never been a better time to explore your options. |