1. Technology

Antivirus: Most Popular Articles

These articles are the most popular over the last month.
How a DDOS Attack Takes Down Sites (Big or Small)
Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?
How to Remove Adware and Spyware
Getting stubborn adware and spyware off your PC can be frustrating. However, there are steps you can take to make the process easier and more effective.
How Safe is the Google Play Store?
Is Google Play Safe from Malware?
7 Things You Should Never Do in Evernote
So-called cloud-based services like Evernote provide a convenient way of remotely storing data accessible from any Web-connected device. But that convenience may come with a price: increased risk of data and identity theft.
How to Easily Remove GoogleUpdate.exe From a...
Google Chrome and an untold number of other Google applications may install an update mechanism named googleupdate.exe, googleupdater.exe, or something similar. GoogleUpdate may continually attempt to access the Internet without requesting permission and without providing an option to disable it. This behavior may persist even after the parent application has been removed. While there's no single way to rid the system of googleupdate, the following tips provide the common install locations.
The Easy Way to Edit the Hosts File on a PC
By modifying the HOSTS file, malware can block access to antivirus updates or force you to a malicious website. It's a good idea to check the HOSTS file periodically. Here's how to find - and edit - the HOSTS file on Windows 7, Vista, and XP.
Find Out if You're Running the Best Antivirus...
It's true - Mac viruses really do exist, although fewer viruses target the Mac OS compared to Windows. In addition, there are cross-platform threats that can impact Mac users. Though the risk of cross-platform threats is relatively small, it's a risk that is on the increase as attackers move to Java and other third-party software exploits. Fortunately, there are several excellent Mac antivirus offerings - and some are even free.
What You Need to Know about the 'iLivid' Virus
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >The iLivid Virus
10 Easy Steps to Disable Add-Ons in IE
When it comes to IE, it seems everyone wants a piece of it. While legitimate toolbars and other browser helper objects (BHOs) are fine, some aren't so legit or - at least - their presence is questionable. Here's how to disable unwanted Add-ons in Internet Explorer.
How Secure Is Your Windows Computer? See the...
The best free antivirus software for Windows PCs. Here are my top picks and reviews of the best free antivirus software for Windows.
Do You Really Need Mac Antivirus Software?
Do you really need Mac antivirus software? Get the answer to that and other frequently asked questions about Mac viruses and Macintosh antivirus software in the Mac Virus FAQs.
The 5 Best Windows Antivirus Software
A list of top antivirus software based on its virus detection abilities, features, and breadth of protection. All tests performed on Windows 7 (32-bit).
Have the FBI Virus? Here's How to Remove It...
The FBI Ransomware can take your PC hostage by forcing you to pay a ransom in order to free you computer. Avoid from becoming a victim and follow these step-by-step instructions for removing the FBI Virus.
How to Delete a Service in Windows 7, Vista, or...
Malware often installs itself as a Windows service in order to load when Windows is started. This allows the malware to run and control designated functions without requiring user interaction. Sometimes, antivirus software removes the malware but leaves the service settings behind. Whether cleaning up after an antivirus removal, or attempting to remove the malware manually, knowing how to delete a service in Windows 7, Vista, or XP will help.
Trojan:JS/Seedabutor.B
Seedabutor.B is a malicious drive-by download attack. Learn how to remove this malware.
What We Like About Sophos Anti-Virus for Mac
Sophos Anti-Virus for Mac Home Edition offers business-grade protection free for home use. And the protection literally is business-grade - the free version is based on the same Mac virus scanner Sophos uses in their Endpoint Security line.
Think Your Email May Have Been Hacked? Read This
Do you suspect your email account has been hacked? Can't login to your email account? Are you getting undeliverable and bounce messages for email you never sent? Are friends and family complaining of receiving email you never sent? Is it malware? A hacker? Here's how to tell.
15 Simple Steps to Disable Autorun
The Windows autorun feature enables CDs to play automatically when inserted in the drive. Removable and thumb drives use the same autorun feature to load files when the drives are plugged into the USB port. Malware relies on this autorun feature to spread from thumb drive to PC. Here's how to disable the autorun feature to prevent malware from spreading.
Exclude Files from Norton Antivirus Scans
False positives can be an annoying problem and unfortunately false positives in antivirus scanners are being increasingly more common. Here's how to exclude a file or folder from scanning by Norton AntiVirus and Norton Internet Security.
How to Avoid Hidden Administrator Apps on Android
Hidden Administrator Apps. Antivirus Software.
EICAR Test File
EICAR is not a virus. EICAR is a special file used to test antivirus software. Here's how to make an EICAR file to test your virus protection.
Don't Be Fooled by the 'Your PC is Infected'...
Someone phones you claiming to be from Microsoft, or an antivirus company, or some random tech support facility. They claim their systems have detected that your computer is infected. And of course they are offering to help. So much so, that for just a one-time payment of X, they are willing to offer a full LIFETIME of guaranteed support.
Setting a Login Password for Mac OS X 10.5 and...
Passwords prevent unauthorized access to your computer. Setting login passwords is easy on Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard). Just follow the step-by-step instructions below.
Want to Keep Your Computer Safe? See the Top 10...
An online virus scanner is not a substitute for installed antivirus, but can be helpful when you need a second opinion. An online virus scanner is also helpful when your existing antivirus is having trouble removing a particular malware. There are several online virus scanners from which to choose and many use the same antivirus engine of their installed counterparts.
Top 5 Malware Threats
Learn about the top most dangerous malware and how to protect your PC from being infected.
Know the 10 Most Common Habits That Put Your...
Keeping safe online takes more than just installing a few security programs. To protect both you and your computer, here are the top ten bad habits you need to avoid.
How to Remove a Virus When Your Computer Won't...
Trying to remove a computer virus or other malware infection can become a battle of wills between you and the attacker. Antivirus software can be a powerful ally, removing most of today's malware with ease. But occasionally, a really stubborn infector may put you at the forefront of the battle. Here's how to help you win.
Best Free Antivirus Downloads for Windows
Free antivirus and antispyware software for Windows 7, Vista and Windows XP. Best free antivirus software to guard against viruses, trojans, worms, and spyware.
Display Hidden Files and Folders on Mac OS X
By default, Mac OS X hides critical system files and folders. As malware threats against Mac users increase, or simply to assist with troubleshooting, it may be necessary to view hidden files and folders. Here's how to enable hidden file and folder viewing on Mac OS X.
SmitFraudFix Removes Zlob and Other Pests
SmitFraudFix is a free antivirus tool that removes the Zlob downloader trojan and the rogue scanner software that Zlob typically installs.
Keep Your Computer Safe with These Free Virus...
A list of free tools, tips, and tricks to get rid of viruses and keep them from getting back on your system.
What You Need to Know about 'Virus Signatures'
In the antivirus world, a signature is an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus.
Best Antivirus Apps for Netbooks and Older...
Older PCs and netbooks often have limited system resources available. Finding the right antivirus that won't slow down these older systems is key.
How to Prevent Adobe Reader from Opening PDFs...
There is an easy way to prevent Adobe Reader and Acrobat from automatically rendering PDF files in your browser. Make this one small tweak, and henceforth you'll be notified if a website tries to open a PDF in your browser.
Don't Be Fooled by One of These 10 Common...
Just as the Internet makes it easier for legitimate pursuits, it also makes it easier for scammers, con artists, and other online miscreants to carry out their virtual crimes - impacting our real life finances, security, and peace of mind. These Internet scams are constantly evolving - here are the most common today.
Most Damaging Malware
All malware is bad, but some types of malware do more damage than others. That damage can range from loss of files to total loss of security. For details, see this list of the most damaging types of malware, including viruses, Trojans and more.
AVG AntiVirus FREE
Mobile devices are increasingly targeted by cyber criminals and malware. In addition, mobile devices are vulnerable to theft or loss, which can put you in danger as someone can access your personal information. For Android users, one of the best security applications is AVG AntiVirus FREE.
Top Cyber Threats for 2014
McAfee has kicked off its annual list of the biggest cyber threats anticipated to take effect in 2014. The following are McAfee’s Top Cyber Threats for 2014:
Firefox Redirect Virus
Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus.
Panda Antivirus - Review of Panda Cloud Antivirus
This free cloud-based scanner takes all the processing off your PC, giving you a lighter, faster, and more proactive protection.
Drive-by Download
Drive-by Downloads are malicious attacks that can infect your computer. Learn more about this threat.
How to Safeguard against Viruses and Other...
Computer security need not be daunting. Here a few simply steps that will keep you computing more safely.
Disable Automatic Wireless Connections
Here's how to beef up your wireless safety by disabling automatic wireless connections.
How to Boot Your Windows PC into Safe Mode
Booting in Safe Mode prevents extraneous services and programs - including most malware - from loading at startup.
How to Disable AutoComplete in Firefox
AutoComplete not only makes it easier for you to automatically fill in forms and logon to secure sites - it also makes it easier for Trojans and hackers to gain access to your personal data and logon credentials. Here's how to clear the sensitive data stored by AutoComplete and how to disable the feature to protect yourself from compromise.
How to Tell if Your Antivirus is Working
When malware gets onto the system, one of the first things it may do is disable your antivirus scanner. It may also modify the HOSTS file to block access to antivirus update servers. Here's how to check for both.
Exclude Programs from DEP (Data Execution...
DEP can cause conflicts with legitimate programs. If this happens to you, here's how to disable DEP for specific applications.
What is Sirefef Malware?
Learn about the dangers of Sirefef (ZeroAccess) Malware and how to prevent it.
AVG Free Edition
AVG Free Edition provides free antivirus protection for Windows XP/2000/NT/ME/98
How to Deal with Boot Sector Viruses
Boot sector virus repair. Antivirus Software.
What to Expect from ClamXav (Free Mac Antivirus...
ClamXav is based on the open source ClamAV virus scanner. Popular among open source fans, in practice ClamAV lags behind the detection capabilities of commercial antivirus software.
How to Edit the HOSTS File on Mac OS X
The HOSTS file supersedes DNS for domain name to IP address resolution. Make sure you know what is in your HOSTS file; unwanted entries could be a sign of malware or other malicious intrusion. Here's how to check the HOSTS file on Mac OS X.
Here's What a 'Keylogger Trojan' Is (Computer...
In its simplest form, a keylogger trojan is malicious, surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner.
How to Configure the Mac OS X Firewall
Firewalls are must-have protection, regardless of the operating system or hardware you choose. All versions of Mac OS X include a built-in firewall, but you will need to enable it or make a few tweaks for optimum security.
If You Have Autorun Worms/Malware, Do This Now...
Autorun worms spread from USB/thumb drives as well as fixed and mapped drives. Autorun worms typically drop or download additional malware, usually backdoors and password stealers. Here's how to remove an autorun worm.
Stuxnet: The Unglamorous Truths About the...
The Stuxnet worm targets industrial control systems - the types of systems that control nuclear power plants, water treatment facilities, and other critical infrastructure. The serious nature of the Stuxnet worm had led to no end of speculation, finger-pointing, and ultimately to confusion about what exactly the Stuxnet worm is all about.
Internet Explorer is Sooooo Slow
One day, you're surfing the Internet just fine. The next day, Internet Explorer has slowed to a crawl. Sometimes, many web sites display
Want to Disable Java in Internet Explorer?...
Java is fast becoming the most targeted third-party application for malicious exploit via the Web. One easy thing you can do to avoid this method of attack is simply disable Java. When you do need it for that website game or calculator, just re-enable it (but be sure to turn it back off when you're done)
What is a Logic Bomb?
Logic bombs are malware that are executed in response to specific events. Learn more about logic bombs and how you can avoid this attack.
Haunting Thought: Is Your PC a Zombie?
In the computer world, a Trojan can be used to turn your PC into their own computing matter - effectively turning it into a zombie machine.
Best Antivirus Software - Readers Choice Awards...
The 2011 Readers' Choice Awards are complete. You nominated. You voted. And now we've tallied those votes and are pleased to announce the winners for Best Antivirus for Windows, Best Antivirus for Mac, Best Internet Security Suite, and Best Free Antivirus.
AAAAAAA@AAA.AAA hoax
Like its predecessor !0000, the AAAAAAA@AAA.AAA tip is doomed to failure. Worse, it can leave you less protected than you were before.
How to Remove Login Startup Items in Mac OS X
Mac malware may load itself as a login startup item, thus manually removing malware on Mac OS X may require deleting that login startup item. Follow these steps to remove unwanted login apps in Mac OS X.
Disable Guest Account in Mac OS X 10.5 and 10.6
Unless you plan on sharing your MacBook or iMac with random people, there's really no good reason to have an active guest account. Follow these steps to disable the guest login account on Mac OS X 10.5 and 10.6.
Autorun FAQs
Autorun is one of those 'convenience' features in Windows that can cause more harm than good. Essentially, Following are frequently asked questions about the Autorun component, including why Autorun can be dangerous and how it can be disabled.
How To Regain Access to the Windows Registry...
Some malware will disable access to the Registry editor. Symptoms include: The registry appears to open but then quickly closes, or you receive the error "Registry editing has been disabled by your administrator". Here's how to regain access to the Windows System Registry.
Choose the Right Antivirus Software for Your PC
Choosing the right antivirus software to protect your system from viruses need not be a daunting tasks. Follow these tips to select the antivirus software that best meets your unique virus protection needs.
Six Easy Ways to Tell if a Virus Really is a...
We've all been there - you get an alert from your virus scanner warning that a particular file is infected. Sometimes the alert reappears even after you've told the antivirus scanner to remove the infection. Or maybe you just have reason to believe the virus alert may be a false positive. Here are the six things you'll want to consider to determine how to handle a virus alert.
Executable file extensions
By default, file extensions cannot be viewed in Windows. Viruses routinely take advantage of this security oversight.
BitDefender Antivirus for Mac
BitDefender Antivirus for Mac detects both Mac and Windows malware. Features include realtime on-access virus protection with the ability to perform full system virus scans, quick scans of critical system areas, as well as scheduled scanning. The quarantine feature in BitDefender Antivirus for Mac safely isolates suspect infected files for forwarding to the BitDefender Antivirus Lab for analysis.
Boot-Sector Viruses
A boot-sector virus takes control when the computer boots up. Here's how it works.
McAfee LiveSafe
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.
How to Disable Windows Remote Desktop
Want to protect your computer from unwanted remote login? One step you should take is to disable Windows Remote Desktop. Here's how.
Enable Folder Options in Windows Explorer
Malware often drops itself as a hidden file and then disables the Folder Options menu in Windows Explorer so you can't change the settings to view hidden files and folders. If you are unable to access the Tools | Folder Options in Windows Explorer, here's how to modify the registry to regain access to the Folder Options menu.
What is Malware?
A detailed explanation of malware, which includes viruses, trojan horses, logic bombs, spyware, worms, and rootkits.
File viruses
As their name suggests, file infectors infect executable type files, either inserting their code into some part of the original file so that it can be executed when the file is accessed, or overwriting the file entirely.
McAfee Mobile Security
Mobile devices are vulnerable to theft or loss, which can put you in danger as someone can access your personal information. One way to secure your identity and protect your device from malware attacks is by using a dependable, reputable mobile security application such as McAfee Mobile Security.
Intego VirusBarrier X5: Mac Antivirus Software...
VirusBarrier provides realtime signature-based and behavior-based scanning and guards against both Mac-specific and Windows-based malware.
Reset Internet Explorer Start & Search Pages
Spyware and adware often change your browser Start and Search pages to point to unwanted websites. Even if you've removed the infestation responsible, you may still need to reset the web settings. Here's how to do this in Internet Explorer.
How to Delete Temporary Files/Cookies in...
Internet Explorer caches web pages you visit and cookies coming from those pages. While designed to speed up browsing, if left unchecked the burgeoning folders can sometimes slow IE to a crawl or cause other unexpected behavior. In general, the less is more principal works well here - keep the Internet Explorer cache small and clear it often. Here's how.
What Is a Virus?
What is a virus? In today's computing environment, a better question might be what is malware?
What Are Adware and Spyware?
Generally speaking, adware and spyware work hand-in-hand. Adware is a program that installs an additional component that feeds advertising, often by delivering pop-up ads or by installing a toolbar in your browser. Spyware surreptitiously monitors your computer and Internet use.
Yes, Your Mac Can Still Get A Virus
Social engineering scams are putting Mac users at risk of malware infection. To help keep you safe on even the tightest budget, here are the top picks for the best free Mac antivirus software.
False Positive
False positives occur when a pattern of code in the file matches the same pattern contained in a virus signature.
Spyware Prevention
Spyware is a form of malware that can infect your computer and reconfigure your Internet browser settings by changing your home page and modifying your search results. Due to the seriousness of spyware and the harm it can do to your system and personal information, it is highly recommended you take the following measures to prevent spyware from overtaking your system.
Amazon Phishing Scam
Phishing scams are disguised as correspondence from valid financial or eCommerce providers. The email typically uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. Here's an example of a phishing scam targeting Amazon.com customers.
ESET Mobile Security for Android -- Free Version
You can have peace of mind while online with ESET Mobile Security. ESET’s proven NOD32 technology enables you to download apps that are safe and will discover potentially dangerous apps. The following Antivirus features are available with the free version of ESET Mobile Security.
How to Add an Extra Layer of Security to...
Java is fast becoming one of the most targeted third-party applications for malicious exploit via the Web. One easy thing you can do to avoid this method of attack is simply disable Java. When you do need it for that website game or calculator, just re-enable it (but be sure to turn it back off when you're done).
Troubleshooting Internet Connection Problems
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >One day, you're
AVG Anti-Virus plus Firewall Edition
AVG Anti-Virus plus Firewall Edition is light on resources, heavy on protection. The firewall provides permission-based access control reminiscent of the popular ZoneAlarm firewall. The high level of control and customization will appeal to the most advanced users, while less savvy users will find the Basic interface simple to understand and use.
What You Should Know about Using Starbuck's WiFi
Wireless Internet access is available at most coffee shops, bookstores, airports, and hotels around the world. But how safe is it
Free Antivirus Apps with Bootable Rescue CD...
A few antivirus vendors offer excellent (and free) rescue CDs that will enable you to boot, scan, and repair an infected machine.
How to Create a Strong Password System
Unless unique passwords are used for each site, it takes only the compromise of a single site's credentials to have a toppling domino affect on the security of all your online assets.
AutoStart Entry Points in Windows
Following is a list of the autostart entry points in Windows, including startup folders, registry keys, and ini files.
AVAST 4 Home Edition
AVAST 4 Home Edition provides free antivirus protection for Windows XP/2000/NT/ME/98
AntiVir PersonalEdition Classic
AntiVir PersonalEdition Classic provides free antivirus protection for Windows XP/2000/NT/ME/98
AVG Rescue CD: Antivirus Review
The free AVG Rescue CD combines a bootable rescue platform with antivirus and system utilities to help ferret out even the most stubborn infections. Utilities include a file manager (Midnight Commander), Windows Registry Editor, a text editor, and various drive recovery and network diagnostic tools.
VirusBarrier Express: Mac Antivirus Review
VirusBarrier Express from Intego is a free on-demand Mac antivirus. VirusBarrier Express scans for Mac malware only, so it's most suited for Mac only users. The lack of realtime on-access protection could be a plus or minus, depending on your needs.
Top Paid Antivirus Software
Combating malware is a never ending process. Cybercriminals continuously deploy new threats with intention of infecting your computer and gaining access to your system. One of the most effective methods of malware prevention is to have an antivirus software installed on your computer. With so many different antivirus applications available, it is easy to feel overwhelmed when selecting a solution that best fits your needs. The following list includes top paid antivirus solutions.
Top Android Antivirus Applications
One way to secure your identity and protect your device from malware attacks is by using a mobile security application. The following are some of the highest ranked Android security applications which are rated by Google Play users.
ESET Mobile Security Premium for Android
You can have peace of mind while online with ESET Mobile Security. ESET’s proven NOD32 technology enables you to download apps that are safe and will discover potentially dangerous apps. The anti-phishing feature helps you avoid dangerous fake websites that can steal your information. ESET Mobile Security will alarm you of unsafe links that could potentially direct you to these malicious websites. The following Antivirus & Anti-Phishing features are available with the free version of ESET Mobile Security.
Recover Missing System Files
On occasion a valid system file can be inadvertently deleted or quarantined. Sometimes, the results can seem disastrous - a looping blue screen each time you try to boot up the PC. Other times, a stop error with a cryptic message may be the result. Here's how to replace the missing file(s) to get your system operational again.
Make Adobe Reader and Acrobat Safer to Use
ulnerabilities in Adobe Reader and Adobe Acrobat are the number one most common infection vector, bar none. Making sure you stay up-to-date with the latest version of Adobe products is imperative, but not foolproof. To use Adobe Reader (and Acrobat) safely, you need to make a few tweaks to its settings. Following are the must-make security changes you need to make in Adobe Reader and/or Adobe Acrobat.
Disabling System Restore to remove viruses
Antivirus software may report that a virus was found in either the _RESTORE (Windows ME) folder or the System Volume Information folder (Windows XP) but the antivirus software may be unable to remove it.
Antivirus Software Technology
Threats are abundant with information systems. One nasty virus can cripple your machine, steal your personal information, and infect other devices. Protecting your computer from malware is perhaps the most important aspect of computer ownership. The first step in protecting your system is understanding how antivirus software operate.
PC Tools iAntiVirus for Mac
PC Tools iAntiVirus offers solid Mac antivirus free for home use. iAntiVirus guards against Mac only malware - a focus that helps keep performance costs and system impact low but may not be the best choice in a mixed Mac/Windows environment.
Why You Need to Check Your Trusted Sites List
Some spyware and adware will add miscreant links to your Internet Explorer Trusted Sites Zone. This may allow the sites to run with fewer security restrictions. Make sure you periodically check the Trusted Sites Zone list to ensure only sites you have specifically added are included. Here's how.
Package Tracking Scams
Package delivery and shipping scams are all too common. This simple tip will keep you from being fooled.
Search Engine Poisoning
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >If there were
Before You Buy Antivirus Software
Antivirus software is one of the most important software programs on your PC. Make sure you know how to select and use it properly. Find out which products fared best and made the Top Picks list.
Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.
Protecting the HOSTS file
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.
How to Disable AVG When It Crashes Your Computer
Search for " AVG crash " and you'll find over 2 million hits on Google. The systemic problem of AVG crashing
Top Free Antivirus Software
Combating malware is a never ending process. Cybercriminals continuously deploy new threats with intention of infecting your computer and gaining access to your system. One of the most effective methods of malware prevention is to have an antivirus software installed on your computer. If you’re on a tight budget, you will be surprised that plenty of free antivirus software can provide more than adequate protection and may be more effective in malware detection than their paid-for counterparts.
Black Hat SEO Poisoning
Black Hat SEO Poisoning is a technique used by cybercriminals to trick search engines, such as Google, Bing, and Yahoo, into ranking a malicious website high in the search engine results page. People land on these sites by entering certain keywords on search engines and clicking on rogue links from the compromised search results. This allows the attackers to have control of web traffic and enables them to lure users on to their infected sites.
What You Need to Know about the 'Stuxnet' Worm
Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are used in infrastructure supporting facilities.
The 6 Best Standalone Spyware Scanners
Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security.
Symptoms of a Virus Infection
A lot of today's malware goes to great lengths to avoid notice. But some viruses exhibit symptoms that might as well be a banner advertising the infection. Here are a few of the most common tell-tale symptoms of a virus infection.
Antivirus for Gamers
Most everyone realizes that antivirus and firewalls are must-have protection. But when protection interferes with online gaming, it can be sorely tempting to disable that protection in favor of uninterrupted play. These antivirus scanners tackle the unique problems of gamers so you can play without sacrificing performance or protection.
Doing an IP Lookup
Doing an IP Lookup. Antivirus Software.
Boot-Sector Viruses - What Is a Boot Sector Virus
A boot-sector virus takes control when the computer boots up. Here's how it works. Page 2.
Web Browser Security
Whether through social engineering or through web site exploit, the choice of browser will be of little help. All browsers are equally susceptible to web-based malware and this includes Firefox, Opera, and the much maligned Internet Explorer. Disabling Javascript on all but the most trusted sites will go a long ways towards safer web browsing.
Trojan
A Trojan is a self-contained malicious program that is different from a virus but can have the same kind of effect on your computer.
BlackHole RAT
BlackHole is a remote administration tool (RAT) that, used maliciously, can also serve as a remote access trojan. The BlackHole RAT can be used on either Mac OS X or Windows computers, and enables a remote attacker to perform potentially malicious actions on the victim's computer.
Kill Winlogon
Malware often hooks into the Winlogon process, enabling the malware to load even in Safe Mode. Removing malware load points from Winlogon may require shutting down the Winlogon process. Here's how.
Fake Antivirus Software
Fake antivirus software will conduct false virus scans on your computer. Learn how to detect these threats.
eBay & PayPal phishing
ebay paypal scams and phishing email
Antivirus FAQs
Answers to frequently asked antivirus questions
Changes to Shell Open Command
Malware can load from a variety of different places on your PC. In addition to the more common modifications to Windows auto start entry points, malware may leverage the shell open command. This allows it to register itself as the handler for certain file types and thus the virus, worm or Trojan loads when any of these file types are called.
Android Master Key Vulnerabilities
Master Key is a vulnerability within the Android security model that allows an attacker to turn any legitimate application into a malicious Trojan horse. The hacker accomplishes this by modifying the APK code without modifying the application’s cryptographic signature. The Android Application Package file (APK) is the file format used by Google’s Android operating system to distribute and install applications.
Free PDF Readers: Alternatives to Adobe Reader...
Malicious PDF files that exploit vulnerabilities in Adobe Reader / Acrobat were the most common cause of drive-by malware infections in 2009 and remains the highest in 2010. Use one of these free alternative PDF readers to lower your risk of infection and stay safer online.
Hoax Encyclopedia: Virus hoaxes
Virus hoaxes and myths waste time and money, and make the sender look foolish. Don't fall victim to a hoax. Use the Hoax Encyclopedia to check out the facts behind that dire sounding email.
Disable IFrames in Internet Explorer
Malicious iframes planted on compromised websites pose big problems for Web surfers. Fortunately, Internet Explorer v6 and above includes a feature that can help protect against malicious iframes. But use with caution - there are many legitimate uses for iframes and IE doesn't distinguish between these.
Preventing Adware & Spyware
Considering the lengths some companies will go to in order to ensure their adware/spyware cannot be easily removed, the best protection is prevention. Fortunately, preventing adware and spyware is simple enough and if you're willing to apply a little elbow grease it won't cost you a dime.
Bitdefender Sphere
Bitdefender Sphere solves a modern day problem faced by today's home user: how to cost effectively protect a wide range of disparate devices against malware and other online threats.
Sality Virus
Sality is a family of file infecting viruses that spread by infecting exe and scr files. The virus also includes an autorun worm component that allows it to spread to any removable or discoverable drive. In addition, Sality includes a downloader trojan component that installs additional malware via the Web.
Blacklist Sites in the NoScript Firefox Addon
There may be cases where you've changed the default settings in NoScript and now want to take advantage of blacklisting to compensate for those changes. Follow these steps to add sites to the NoScript blacklist.
Ten Tips to Protect Against Identity Theft
Every 3.5 seconds in the United States, someone's identity is stolen. Unfortunately, many view identity theft as an 'online' only problem. It's true that phishing scams, Trojans, and other forms of cybercrime are a factor, but there are also far more low tech means of identity theft - including digging through your garbage or stealing your wallet or purse. You can minimize your risk by following these ten tips.
Use SmitFraudFix to Remove Zlob and Other Pests
SmitFraudFix is a free antivirus download that removes the Zlob trojan downloader and the malware that Zlob installs. These instructions describe how to use SmitFraudFix properly.
International Lottery Winner Scam
The International Lottery Winner scam attempts to trick recipients into believing they have won large sums of cash, and then bilks them out of their own dough in a similar fashion to the Nigerian 419 scam.
What Is Scareware?
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Scareware is fraudulent
How to Restore Access to Task Manager
To make manual inspection and removal more difficult, malware often disables access to Task Manager. Fortunately, a few quick registry edits are usually all that are needed to regain control. Here's how.
Google Android: At More Risk of Malware or FUD?
Is the Google Android really at greater risk of malware? Or is it simply a bigger target for FUD (Fear, Uncertainty, and Doubt)?
Online Virus Sandbox
Years ago, if your antivirus detected a virus, chances are you'd find a pretty complete description of that threat in any number of virus encyclopedias. Today, however, with a few tens of thousands of malware being dissected each day, it's very rare to find a meaningful virus description. Fortunately, if you need specific details on what a particular bit of malware does, there are several online virus sandboxes that can give you a quick answer.
McAfee VirusScan for Mac
McAfee VirusScan for Mac (formerly known as Virex) can be used as a standalone virus scanner for Mac or integrated with McAfee ePolicy Orchestrator (ePO) for enterprise management.
Half of Anti-Virus Apps Fail to Block Zero-Day...
Lastline Labs, a cybersecurity research team (Engin Kirda, Christopher Kruegel, and Giovanni Vigna), conducted a research on Anti-virus technology and how they handle the latest malware threats.
What is Antivirus Software?
You've been told to run antivirus software and so you do. But do you really know what antivirus software is?
Bootleg Version of Card Recon Used by...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Card Recon, from
Norton AntiVirus Dual Protection for Mac
Norton AntiVirus Dual Protection for Mac is designed for Mac users who routinely dual boot into Windows or run Windows in a virtual environmenton their Intel-based Mac.
Keep Your Digital Life Safe
Hackers are becoming more of a threat than ever before. Within the past few months, we’ve seen big corporations such as Microsoft and eBay become victims of security breaches. With cybercrimes on the rise, this is a good time to strengthen your online security practices. Here are some tips that may help secure your digital life from cyber breaches and attacks.
You can opt-out at any time. Please refer to our privacy policy for contact information.

©2014 About.com. All rights reserved.