InfoCarnivore.com is your premier infographic website and directory. Browse high-quality infographics and instructographics and submit your own for inclusion.
Posts tagged "malware"

Sandbox technology, what is it?

Sandbox technology is something that is getting more and more publicity lately, but still many individuals and particularly your average home user don't really know much about it. Since the infocarnivore blog focuses on the simpler side of security with the aim of assisting individuals who aren't computer security experts I thought I'd write...

No longer can Mac users claim they are safe

I think the general perception is that Mac's are safer, but I don't believe that the general public sees the whole picture. Apple would love for us to believe that they are dominantly better when it comes to security, and most people think they are less susceptible to malware with a Mac. Is...

Safe Returner 1.24 review

Safe Returner is a relatively new anti-malware solution for infected PCs. I must say it is somewhat similar to malwarebytes but does at the same time stand alone. It is a useful and effective anti-malware tool. Packed small, installs quickly, and runs incredibly fast with some unique features. I would...

Keep your wordpress blog malware free

wp-malwatchHackers are always on the lookout for vulnerable websites. It is important to keep your wordpress blog up-to-date and protected. Improving WordPress blog security requires a combination of vulnerability detection, attack blocking, and scanning. I recently discovered WP-MalWatch which is a useful and effective WordPress security plugin. This simple to install...

Analyze your suspicious files

Valuable Malware resource: VirusTotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.

To torrent or not to torrent, Are Torrents Safe?

Are torrents safe? I've been getting asked a lot about torrents lately. Is it safe? I thought I'd write an ethics aside article about torrents. I'm not interested in giving my opinion on the legal side of torrents, and whether I think it is right or wrong. That is for you to...

Panda Cloud Antivirus test against malware

Panda has released version 1.1 of their free cloud anti-virus and Matt Rizos of remove-malware.com puts it to the test in this video.

Security trends for 2010 : Be watchful

Social Engineering: A Major concern Social engineering is the act of maneuvering people into performing actions or divulging confidential information. Various web criminals adopt such practices and never come face-to-face with the victim. Therefore, security companies like Symantec has suggested that such practices will surely increase in 2010. Microsoft’s Windows 7 Microsoft’s Windows 7 is the most secure...

Autorun malwares dominate 2010.

You may be surprised to discover that Virus Bulletin's recent malware prevalence report claims autorun malwares (autorun worms) as the most prevalent malware thus far in 2010, with over 10.7% of all globally reported infections being of the autorun nature. In second place were visual basic scripts and in third Conficker / Downadup. ...

The most destructive viruses ever.

What are the most destructive viruses ever? Viruses have been wreaking havoc on computers since 1986 when the first virus, known as BRAIN showed up on the scene. Brain is considered to be the first virus found on PC's and infected MS-DOS. Over the past 24 years there have been over 65,000...

Central and South American Countries Swamped with Malware

According to a latest study by the security firm Zscaler, Central and South American countries such as Argentina and Honduras are spreading and hosting malware at a higher percentage of their total Internet traffic compared to other countries. Zscaler has prepared the first-quarter “State of the Web” report and states that it has analyzed every...

Malware tool of the week: HiJackThis

Trend Micro HijackThis (HJT) is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively remove items from your machine. In addition to this scan and remove capability HijackThis...