A "bot" -- a piece of malicious software that can spread and function much like a computer virus or worm -- is seizing on vulnerable MySQL database software running on Windows systems to spread and scan for new victims. While the MySQL Bot, also known as the Spool CLC, is mitigated by the limited nu...
A computer virus has spread to handheld versions, Symantec and Kaspersky Labs report. A program, known as Backdoor.Brador.A, attacks PDAs running the Windows CE operating system. Once installed, the program activates when the PDA is restarted and begins to search for a remote administrator to take c...
Viruses finally reached out and touched handheld computers Thursday with Symantec and Kaspersky Labs reporting a backdoor Trojan horse program that can take control of a mobile device. The program, known as Backdoor.Brador.A, attacks PDAs running the Windows CE operating system. Once installed, the ...
Security advisories and reports typically include preventive measures that computer users can take to avoid malicious Internet attacks, but one piece of advice is on the rise: Use a Web browser other than Microsoft's Internet Explorer. Security experts themselves have indicated that their own use of...
Voice over Internet Protocol (VoIP) has become an increasingly hot market, with new players such as Vonage touting the ability to deliver voice communications for less cost. While there are technical, regulatory and other issues that remain ahead for VoIP, security was highlighted as a chief concern...
Most of us are afraid of getting infected with a virus, whether it comes from a common cold or an attachment in our e-mail. Are open-source licenses viral in nature? Can they infect downstream users? The question is the subject of considerable debate. Companies refer to open-source software as "pote...
A series of arrests in Germany for alleged computer virus creation is likely to deter casual virus writers, but worms and variants continue and the most hardened computer criminals will probably be more careful, not quelled by the arrests, according to security experts. The biggest arrest came last ...
It's bad enough when virus writers can download their worm code of choice and relatively simply unleash a new variant on the Internet, but Friday showed something even worse: Virtually zero effort is needed to entice people to open attachments. So far, the non-sophisticated, no-subject, no-text Bagl...
Keystroke loggers and spyware developers may soon be silenced, as Congress is debating a bill that would outlaw the intrusive software and declare it akin to trespassing on private property. "It's my computer. It's my private property," said Sen. Conrad Burns (R-Montana), during a public hearing in ...
Through the years, some malicious computer programs have come to be known as viruses. Dr. Fred Cohen, a principal analyst with market research firm Burton Group, coined the term when he was working as a graduate student at the University of Southern California in the early 1980s. "There was a resemb...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.