Viruses, worms, spyware, and other malware

Email Alerts

Register now to receive SearchSecurity.in-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • crimeware kit (attack kit)

    A crimeware kit, also called an infection, exploit or DIY attack kit, is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.   

  • Stuxnet

    The Stuxnet worm is a rootkit exploit that targets Supervisory Control and Data Acquisition (SCADA) systems. SCADA is used in power, water and sewage plants, as well as in telecommunications and oil and gas refining. 

  • active man-in-the-middle attack (MitM)

    Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and a requested website. 

  • How to use Wireshark to detect and prevent ARP spoofing

    Video: Keith Barker of CBT Nuggets demonstrates how to use Wireshark, the popular open source packet analyzer, to prevent ARP spoofing attacks. 

  • DEF-CON Bangalore (DC9180) Meet Live

    Get a front row view of the action-packed goings on at DEFCON Bangalore 2012 in this Live photo feature. 

  • Nine must-have OSINT tools

    Open source intelligence tools aid in target discovery during the reconnaissance phase. Here are nine must-have OSINT tools for finding maximum target info. 

  • Expert Bruce Schneier's Stuxnet malware analysis

    In this RSA Conference 2011 interview, security luminary Bruce Schneier, breaks down his Stuxnet malware analysis. Schneier discusses who could have benefited from creating Stuxnet, how the main stream media hype affected the Trojan, how it could hav... 

  • Malware and email authentication for financial services

    Malware and fighting phishing with email authentication are major security topics for financial services firms. In part two of this video, Paul Smocer discusses the threats and mitigation options. 

  • Smart tactics for antivirus and antispyware

    AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural perspective. You'll learn the benefits of standalone prod... 

  • PCI compliance requirement 5: Antivirus

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 5: "Use and regularly update antivirus software." 

  • Johannes Ullrich: ISC, stealthy malware

    SANS Chief Research Officer Johannes Ullrich discusses the Internet Storm Center (ISC), information sharing and the state of malware. 

About Viruses, worms, spyware, and other malware

Bring viruses, worms and spyware threats under control with these resources. Keep updated with the latest virus news. Select the best antivirus and antispyware options from our reviews to select best of breed solutions. Curb malware menace with advanced tips. Manage antivirus solutions with ease across the enterprise.