Worm Stuxnet Made in Israel and U.S. - Intelligence sources confirmed, Stuxnet computer virus, which had circulated in 2010, is a virus that was designed specifically by Israel and the U.S. to attack Iran's uranium enrichment facilities in order to impede the progress of the country's nuclear program.
The New York Times, quoting various sources of intelligence and computer experts in the U.S.
Showing posts with label Virus. Show all posts
Showing posts with label Virus. Show all posts
Tuesday, February 8, 2011
China Viruses Attack Android Smartphone
China Viruses Attack Android Smartphone - One type of virus that attacks a cell phone that uses Google's Android operating system made in China reported. This weakness allows hackers (hackers) to gain access to personal data of smart phone owners remotely.
The report quoted Lookout Mobile Security declared a new type of Trojan virus that attacks the Android device has been dubbed "Geinimi".
The report quoted Lookout Mobile Security declared a new type of Trojan virus that attacks the Android device has been dubbed "Geinimi".
Friday, December 31, 2010
USB Virus Scan
USB Virus Scan - USB Virus Scan is an antivirus software installed in computer to block threats spreading through removable drives. USB Virus Scan provides 100% protection for computer against any malicious programs trying to attack via USB storage.
USB Virus Scan uses innovative proactive technology to block any threats via USB storage. There are relatively few products available in shops or on
USB Virus Scan uses innovative proactive technology to block any threats via USB storage. There are relatively few products available in shops or on
Saturday, December 11, 2010
Overcoming Virus on Computer Networks
Overcoming Virus on Computer Networks - Many viruses are spread through computer networks in cafes or offices, especially, as a result of Internet access. One client computers are infected, can infect the entire network of computers that may be up to hundreds. Moreover, each client computer to share files/folders will be more susceptible to virus that in fact is always looking for opportunities
Tuesday, November 30, 2010
6 Best Anti Virus Software for Free
6 Best Anti Virus Software for Free - There are many free antivirus software options out there, but not all of them can count on. Choosing a free antivirus software had to be careful because although many options but not all of them capable of providing protection against computer viruses ever-increasing numbers each day. We will need a free antivirus software which in addition is also quite
Monday, October 11, 2010
Email Spam Contains Trojan more intense
Because of the recession that occurred recently, the Federal Deposit Insurance Corporation (FDIC) in the United States have closed many banks that failed. Until mid-December 2009, as many as 140 banks had been closed by the FDIC.
Well, because of the large mass media coverage on the news, spammers (junk message sender) took advantage of this situation to their advantage.
One action is to send
Well, because of the large mass media coverage on the news, spammers (junk message sender) took advantage of this situation to their advantage.
One action is to send
Counteract Virus on Windows using Linux
The virus can exist everywhere, including on Linux. Although a virus can not live on Linux, but he could catch the other operating system, call it Windows. This can happen when Windows users on a LAN to save his files on the Linux server via Samba. We will make Linux help Windows in overcoming the files that contain viruses.
To counteract the virus, we can use the ClamAV. The trials using
To counteract the virus, we can use the ClamAV. The trials using
Thursday, May 27, 2010
Malware and their Solutions
Malware (short for English expressions: malicious software, which means that the suspicious software) is a computer program that was created with the intent and purpose of its creator and is a great program to find the weaknesses of the software. Generally malware created to break or damage any software or operating system through a hidden script that is inserted by the manufacturer.Examples of
Subscribe to:
Posts (Atom)