threat-morphosis-evolution-computer-virus

Threat Morphosis: Evolution of the Computer Virus

February 14, 2014

Computers are our creation, and like us, they get sick. There are malevolent growths within them: viruses. As technology progresses, so do the they. This happens in the same way that biological viruses evolve along with the development of new antibiotics; the more complex the antibiotics are, the more resilient the surviving viruses are. Computer […]

state-spam

State of Spam

January 18, 2014

We asked average Joes about how they react to spam, phishing threats and malware. Source

the-growing-threat-of-smartphone-hackers

The Growing Threat of Smartphone Hackers

January 16, 2014

As smartphones become more sophisticated so do the malicious programs designed to hack sensitive information from your phone. This infographic takes a look at what types of smarthpone hacking programs exist, how they work and the best way to protect sensitive information in your phone. Source

mbr-malware-back-fashion

MBR Malware Back in Fashion

December 10, 2013

They say that fashion comes in cycles, is Master Boot Record (MBR) malware making a comeback in 2011? It certainly looks that way. Source

Twitter Malware Through Time

Twitter Malware Through Time

April 23, 2013

The immune system for that little blue bird (Twitter) may be a bit compromised as the social broadcast service has dealt with a number of “infections” dating back to April of ’07. This infographic from Kaspersky Labs illustrates the various malware attacks associated with Twitter. #theinternetismean Source

Two Decades of Malware

Two Decades of Malware

December 11, 2012

Threat metamorphosis and the shifting motivations behind digital threats (malware, viruses, etc). Source

Antivirus Information

Antivirus Information

November 6, 2012

The most attacked brands are Paypal, eBay and Facebook but users should wonder out loud, are you safe? Download these charts for an educational read and startling reminder of why users should always run antivirus on their computers. Source

Malware Milestones

Malware Milestones

August 24, 2012

The history of computer viruses. Source

Botnets: The Stealthy Online Threat

Botnets: The Stealthy Online Threat

July 13, 2012

Complaints about internet criminal activity dropped 10 percent last year, even as the number of computers hijacked by botnets shot up more than 600 percent. Computer users may be getting savvier, but online criminals are finding new methods of attack. Source

Cybercrime Goes Global

Cybercrime Goes Global

June 10, 2012

How To Protect Yourself From This Epidemic With The Right Antivirus Software. Cybercrime has become a silent global epidemic. This shocking truth is uncovered by the Norton Cybercrime Report.

Inside the Business of Malware

Inside the Business of Malware

May 31, 2012

Everyone’s computer gets malware on it at some point. It’s rarely anything to do with identity theft and it’s just annoying and slows your computer down. Why is there so much of it? What actually motivates anyone to write this software and infect so many computers with it? Is someone making money off this and […]