ESET’s business security suite is engineered to find the most recent threats -- even those whose signatures have not yet appeared on malware lists, are disguised as legitimate software or that are…
Harley's article advocates multiple solutions that combine the best coverage and cost. The right, free anti-virus is a lot better than no protection, but the relatively low outlay for a competent…
This paper is a six-month anniversary review of MS Window 8, including advantages and threats. There are 3 broad categories of Windows 8 devices: PCs, tablets, and smartphones. Windows 8 is on track…
Spring 2013's "Why Last Year's Security Strategy Can't Protect You From Today's Threats" addresses the changing virus and malware threats.The piece notes the top 3 SMB security vulnerabilities: 1.…
Botnets of the Mind. Author David Harley discusses Botnets, hoaxes, chain messages, misinformation, misconceptions, chain letters, spam, victims, bot-infected machines, viruses of the mind, malicious…
Human gullibility and suspended disbelief have been around forever. Malware authors have largely moved on from hobbyist after self-gratification to profiteers after big money. The identity of a hoaxer…