1. Technology
You can opt-out at any time. Please refer to our privacy policy for contact information.
Tommy Armendariz

Updated Articles and Resources

By Tommy Armendariz

    Updated Articles and Resources
    • Google's Project Zero Created: Thursday, July 31, 2014 Updated: Thursday, July 31, 2014
      Google has announced Project Zero, a group of elite hackers formed to hunt down zero-day security risks in various pieces of software, not just in Google products.
    • Android Ransomware Locks Device Created: Thursday, July 31, 2014 Updated: Thursday, July 31, 2014
      Android users are a constant target for cybercrooks, who have released a new scareware with ransomware capabilities that locks the mobile phone completely.
    • CryptoLocker Still a Security Threat Created: Thursday, July 31, 2014 Updated: Thursday, July 31, 2014
      The recent joint operation of law enforcement agencies and private security firms that led to dismantling the Gameover Zeus and CryptoLocker botnets may not have scared off the cybercriminals completely, as new variants of the crypto malware have emerged, creating new networks of infected computers.
    • 97% of Global 2000 External Servers Still Vulnerable After Heartbleed Created: Thursday, July 31, 2014 Updated: Thursday, July 31, 2014
      According to a research from security solutions developer Venafi, 97 percent of the Global 2000 organizations’ externally facing servers continue to be vulnerable to cyber attacks due to incomplete Heartbleed remediation.
    • Controlling Malware from the Cloud Created: Monday, June 30, 2014 Updated: Monday, July 28, 2014
      Researchers at Trend Micro released a blog post detailing the company’s findings regarding botnets and malware being hosted and controlled through cloud servers.
    • Bootleg Version of Card Recon Used by Cybercriminals Created: Monday, June 30, 2014 Updated: Monday, July 21, 2014
      Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
    • Android SMS Worm: Selfmite Created: Monday, June 30, 2014 Updated: Sunday, July 06, 2014
      AdaptiveMobile researchers reported finding a piece of Android malware known as Selfmite that spreads like a worm by sending out SMS messages to infected users’ contacts.
    • Host Intrusion Protection Software (HIPS) Created: Wednesday, May 07, 2008 Updated: Thursday, July 03, 2014
      Host Intrusion Protection Software, or HIPS, provides rule and behavior-based system monitoring to guard against unwanted changes.
    • What's an Amplified DDoS Attack? Created: Monday, June 30, 2014 Updated: Monday, June 30, 2014
      The purpose of a DDoS (distributed denial-of service) attack is to disrupt the activity of a service by flooding the servers with so much junk traffic that they run out of resources to process it.
    • Before You Buy Antivirus Software Created: Monday, September 01, 2003 Updated: Monday, June 30, 2014
      Antivirus software is one of the most important software programs on your PC. Make sure you know how to select and use it properly. Find out which products fared best and made the Top Picks list.
    • Invitation Virus Hoax Created: Monday, February 20, 2006 Updated: Monday, June 30, 2014
      The Invitation virus hoax is a knock-off on the old
    • SmitFraudFix Removes Zlob and Other Pests Created: Monday, September 15, 2008 Updated: Friday, June 27, 2014
      SmitFraudFix is a free antivirus tool that removes the Zlob downloader trojan and the rogue scanner software that Zlob typically installs.
    • Bitdefender Sphere Created: Tuesday, January 31, 2012 Updated: Thursday, June 26, 2014
      Bitdefender Sphere solves a modern day problem faced by today's home user: how to cost effectively protect a wide range of disparate devices against malware and other online threats.
    • Passwords: Creating and Maintaining a Strong Password System Created: Monday, February 05, 2007 Updated: Thursday, June 26, 2014
      Unless unique passwords are used for each site, it takes only the compromise of a single site's credentials to have a toppling domino affect on the security of all your online assets."
    • Password Safety: Tips for Keeping Passwords Safe Created: Monday, February 05, 2007 Updated: Wednesday, June 25, 2014
      So you've created a strong password system following the tips outlined in" itemprop="description"> Thursday, January 24, 2013 Updated: Saturday, June 21, 2014
      The FBI Ransomware can take your PC hostage by forcing you to pay a ransom in order to free you computer. Avoid from becoming a victim and follow these step-by-step instructions for removing the FB...
    • ClamXav -- Free Mac Antivirus Software Created: Monday, September 22, 2008 Updated: Saturday, June 21, 2014
      ClamXav is based on the open source ClamAV virus scanner. Popular among open source fans, in practice ClamAV lags behind the detection capabilities of commercial antivirus software.
    • Chromebleed - Heartbleed Scanner Created: Wednesday, April 30, 2014 Updated: Friday, June 20, 2014
      The Heartbleed vulnerability has been around for two years and it’s uncertain if cybercriminals have exploited it during this time frame. Now that the news is out, it’s very likely that...
    • Top Standalone Spyware Scanners Created: Friday, June 15, 2007 Updated: Friday, June 20, 2014
      Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security.
    • Stuxnet Worm Created: Wednesday, October 06, 2010 Updated: Friday, June 20, 2014
      Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are used in infrastructure supporting facilities.
    • Using Your Laptop at Starbucks: Is it Safe? Created: Friday, December 09, 2005 Updated: Friday, June 20, 2014
      Wireless Internet access is available at most coffee shops, bookstores, airports, and hotels around the world. But how safe is it" itemprop="description"><...
    • Check your Trusted Sites List Created: Wednesday, June 08, 2005 Updated: Friday, June 20, 2014
      Some spyware and adware will add miscreant links to your Internet Explorer Trusted Sites Zone. This may allow the sites to run with fewer security restrictions. Make sure you periodically check the...
    • Microsoft/AOL E-Mail Tracking Created: Monday, November 08, 2004 Updated: Thursday, June 19, 2014
      Is Bill Gates really promising big bucks as part of an email beta test?" itemprop="description"> Tuesday, February 28, 2006 Updated: Thursday, June 19, 2014
      AutoComplete not only makes it easier for you to automatically fill in forms and logon to secure sites - it also makes it easier for Trojans and hackers to gain access to your personal data and log...
    • Reset Internet Explorer Start & Search Pages Created: Wednesday, June 08, 2005 Updated: Thursday, June 19, 2014
      Spyware and adware often change your browser Start and Search pages to point to unwanted websites. Even if you've removed the infestation responsible, you may still need to reset the web settings. ...
    • Drive-by Download Created: Tuesday, April 30, 2013 Updated: Thursday, June 19, 2014
      Drive-by Downloads are malicious attacks that can infect your computer. Learn more about this threat." itemprop="description"> Sunday, March 24, 2013 Updated: Thursday, June 19, 2014
      Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus." itemprop="descriptit3'" --> itemprop="descri...
    • Exclude Files from Norton Antivirus Scans Created: Monday, May 17, 2010 Updated: Thursday, June 19, 2014
      False positives can be an annoying problem and unfortunately false positives in antivirus scanners are being increasingly more common. Here's how to exclude a file or folder from scanning by Norton...
    • How to Edit the HOSTS File on Mac OS X Created: Wednesday, July 20, 2011 Updated: Thursday, June 19, 2014
      The HOSTS file supersedes DNS for domain name to IP address resolution. Make sure you know what is in your HOSTS file; unwanted entries could be a sign of malware or other malicious intrusion. Here...
    • Top Cyber Threats for 2014 Created: Tuesday, December 31, 2013 Updated: Thursday, June 19, 2014
      McAfee has kicked off its annual list of the biggest cyber threats anticipated to take effect in 2014. The following are McAfee’s Top Cyber Threats for 2014:
    • How to Prevent Adobe Reader from Opening PDFs in Internet Explorer Created: Wednesday, September 29, 2010 Updated: Thursday, June 19, 2014
      There is an easy way to prevent Adobe Reader and Acrobat from automatically rendering PDF files in your browser. Make this one small tweak, and henceforth you'll be notified if a website tries to o...
    • Setting a Login Password for Mac OS X 10.5 and 10.6 Created: Wednesday, September 01, 2010 Updated: Thursday, June 19, 2014
      Passwords prevent unauthorized access to your computer. Setting login passwords is easy on Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard). Just follow the step-by-step instructions below.

    ©2014 About.com. All rights reserved.