1. Technology
You can opt-out at any time. Please refer to our privacy policy for contact information.
Tommy Armendariz

Updated Articles and Resources

By Tommy Armendariz

    Updated Articles and Resources
    • Bootleg Version of Card Recon Used by Cybercriminals Created: Monday, June 30, 2014 Updated: Monday, July 21, 2014
      Bootleg versions of a powerful tool called "Card Recon" from Ground Labs, which searches for payment card data stored in the nooks and crannies of networks, have been appropriated by cybercriminals.
    • Android SMS Worm: Selfmite Created: Monday, June 30, 2014 Updated: Sunday, July 06, 2014
      AdaptiveMobile researchers reported finding a piece of Android malware known as Selfmite that spreads like a worm by sending out SMS messages to infected users’ contacts.
    • Host Intrusion Protection Software (HIPS) Created: Wednesday, May 07, 2008 Updated: Thursday, July 03, 2014
      Host Intrusion Protection Software, or HIPS, provides rule and behavior-based system monitoring to guard against unwanted changes.
    • What's an Amplified DDoS Attack? Created: Monday, June 30, 2014 Updated: Monday, June 30, 2014
      The purpose of a DDoS (distributed denial-of service) attack is to disrupt the activity of a service by flooding the servers with so much junk traffic that they run out of resources to process it.
    • Controlling Malware from the Cloud Created: Monday, June 30, 2014 Updated: Monday, June 30, 2014
      Researchers at Trend Micro released a blog post detailing the company’s findings regarding botnets and malware being hosted and controlled through cloud servers.
    • Before You Buy Antivirus Software Created: Monday, September 01, 2003 Updated: Monday, June 30, 2014
      Antivirus software is one of the most important software programs on your PC. Make sure you know how to select and use it properly. Find out which products fared best and made the Top Picks list.
    • Invitation Virus Hoax Created: Monday, February 20, 2006 Updated: Monday, June 30, 2014
      The Invitation virus hoax is a knock-off on the old
    • SmitFraudFix Removes Zlob and Other Pests Created: Monday, September 15, 2008 Updated: Friday, June 27, 2014
      SmitFraudFix is a free antivirus tool that removes the Zlob downloader trojan and the rogue scanner software that Zlob typically installs.
    • Bitdefender Sphere Created: Tuesday, January 31, 2012 Updated: Thursday, June 26, 2014
      Bitdefender Sphere solves a modern day problem faced by today's home user: how to cost effectively protect a wide range of disparate devices against malware and other online threats.
    • Passwords: Creating and Maintaining a Strong Password System Created: Monday, February 05, 2007 Updated: Thursday, June 26, 2014
      Unless unique passwords are used for each site, it takes only the compromise of a single site's credentials to have a toppling domino affect on the security of all your online assets."
    • Password Safety: Tips for Keeping Passwords Safe Created: Monday, February 05, 2007 Updated: Wednesday, June 25, 2014
      So you've created a strong password system following the tips outlined in" itemprop="description"> Thursday, January 24, 2013 Updated: Saturday, June 21, 2014
      The FBI Ransomware can take your PC hostage by forcing you to pay a ransom in order to free you computer. Avoid from becoming a victim and follow these step-by-step instructions for removing the FB...
    • ClamXav -- Free Mac Antivirus Software Created: Monday, September 22, 2008 Updated: Saturday, June 21, 2014
      ClamXav is based on the open source ClamAV virus scanner. Popular among open source fans, in practice ClamAV lags behind the detection capabilities of commercial antivirus software.
    • Chromebleed - Heartbleed Scanner Created: Wednesday, April 30, 2014 Updated: Friday, June 20, 2014
      The Heartbleed vulnerability has been around for two years and it’s uncertain if cybercriminals have exploited it during this time frame. Now that the news is out, it’s very likely that...
    • Top Standalone Spyware Scanners Created: Friday, June 15, 2007 Updated: Friday, June 20, 2014
      Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security.
    • Stuxnet Worm Created: Wednesday, October 06, 2010 Updated: Friday, June 20, 2014
      Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are used in infrastructure supporting facilities.
    • Using Your Laptop at Starbucks: Is it Safe? Created: Friday, December 09, 2005 Updated: Friday, June 20, 2014
      Wireless Internet access is available at most coffee shops, bookstores, airports, and hotels around the world. But how safe is it" itemprop="description"><...
    • Check your Trusted Sites List Created: Wednesday, June 08, 2005 Updated: Friday, June 20, 2014
      Some spyware and adware will add miscreant links to your Internet Explorer Trusted Sites Zone. This may allow the sites to run with fewer security restrictions. Make sure you periodically check the...
    • Microsoft/AOL E-Mail Tracking Created: Monday, November 08, 2004 Updated: Thursday, June 19, 2014
      Is Bill Gates really promising big bucks as part of an email beta test?" itemprop="description"> Tuesday, February 28, 2006 Updated: Thursday, June 19, 2014
      AutoComplete not only makes it easier for you to automatically fill in forms and logon to secure sites - it also makes it easier for Trojans and hackers to gain access to your personal data and log...
    • Reset Internet Explorer Start & Search Pages Created: Wednesday, June 08, 2005 Updated: Thursday, June 19, 2014
      Spyware and adware often change your browser Start and Search pages to point to unwanted websites. Even if you've removed the infestation responsible, you may still need to reset the web settings. ...
    • Drive-by Download Created: Tuesday, April 30, 2013 Updated: Thursday, June 19, 2014
      Drive-by Downloads are malicious attacks that can infect your computer. Learn more about this threat." itemprop="description"> Sunday, March 24, 2013 Updated: Thursday, June 19, 2014
      Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus." itemprop="descriptit3'" --> itemprop="descri...
    • Exclude Files from Norton Antivirus Scans Created: Monday, May 17, 2010 Updated: Thursday, June 19, 2014
      False positives can be an annoying problem and unfortunately false positives in antivirus scanners are being increasingly more common. Here's how to exclude a file or folder from scanning by Norton...
    • How to Edit the HOSTS File on Mac OS X Created: Wednesday, July 20, 2011 Updated: Thursday, June 19, 2014
      The HOSTS file supersedes DNS for domain name to IP address resolution. Make sure you know what is in your HOSTS file; unwanted entries could be a sign of malware or other malicious intrusion. Here...
    • Top Cyber Threats for 2014 Created: Tuesday, December 31, 2013 Updated: Thursday, June 19, 2014
      McAfee has kicked off its annual list of the biggest cyber threats anticipated to take effect in 2014. The following are McAfee’s Top Cyber Threats for 2014:
    • How to Prevent Adobe Reader from Opening PDFs in Internet Explorer Created: Wednesday, September 29, 2010 Updated: Thursday, June 19, 2014
      There is an easy way to prevent Adobe Reader and Acrobat from automatically rendering PDF files in your browser. Make this one small tweak, and henceforth you'll be notified if a website tries to o...
    • Setting a Login Password for Mac OS X 10.5 and 10.6 Created: Wednesday, September 01, 2010 Updated: Thursday, June 19, 2014
      Passwords prevent unauthorized access to your computer. Setting login passwords is easy on Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard). Just follow the step-by-step instructions below.
    • How to Remove a Virus When Your Computer Won't Work Created: Wednesday, October 22, 2008 Updated: Thursday, June 19, 2014
      Trying to remove a computer virus or other malware infection can become a battle of wills between you and the attacker. Antivirus software can be a powerful ally, removing most of today's malware w...
    • How to Delete a Service in Windows 7, Vista, or XP Created: Monday, June 21, 2010 Updated: Thursday, June 19, 2014
      Malware often installs itself as a Windows service in order to load when Windows is started. This allows the malware to run and control designated functions without requiring user interaction. Some...
    • Hidden Administrator Apps Created: Saturday, August 31, 2013 Updated: Thursday, June 19, 2014
      Hidden Administrator Apps. Antivirus Software." itemprop="description">
      1. Technology
      • Share
      You can opt-out at any time. Please refer to our privacy policy for contact information.

      Updated Articles and Resources

      By

      Android devices _hi.txt" -->Android devic...
    • Is Google Play Safe? Created: Thursday, January 24, 2013 Updated: Thursday, June 19, 2014
      Is Google Play Safe from Malware?" itemprop="description">
      1. Technology
      • Share
      You can opt-out at any time. Please refer to our privacy policy for contact information.

      Updated Articles and Resources

      By

      If you’re an Android use you’re an Android ...

    ©2014 About.com. All rights reserved.