TITLE

Malware Grows Up, Gets Hard To Stop

AUTHOR(S)
Dumiak, Michael
PUB. DATE
May 2007
SOURCE
Bank Technology News;May2007, Vol. 20 Issue 5, p15
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the problems associated with the proliferation of malware, referencing to the Super Bowl and Centers for Disease Control malware incidents in the U.S. The author relates that malware has evolved into a staggering array of noxious varieties and strains which make it more difficult to detect and stop. Payments expert at Glenbrook Partners Jim Salters cautioned that companies should develop technologies that would protect their customer desktops.
ACCESSION #
25116561

 

Related Articles

  • Keeping pace…for now. Hurley, Billy // Information Security;Apr2007, Vol. 10 Issue 4, p21 

    The article focuses on antimalware and web filtering which protects an infrastructure from malicious code. malware defense is said to require various approaches. According to John Hornbuckle, network manager for the Taylor County school district in Florida, the antimalware technology offers a...

  • Major Concerns In 2009.  // Database & Network Journal;Feb2009, Vol. 39 Issue 1, p25 

    The article reports on findings by BitDefender on electronic threats in 2008 and 2009. BitDefender focused on software vulnerabilities, exploits, different types of malware, cyber crime prevention and law enforcement. More than 80 percent of malware distributed worldwide in 2008 consisted of...

  • SECURITY MONITORS FOR JAVA PROGRAMS WITH MPL. Leppänen, Ville; Mäkela, Jari-Matti // International Journal on Information Technologies & Security;2012, Vol. 4 Issue 1, p35 

    Security breaches caused by various malicious programs/program fragments can be tackled by either preventing their existence in computer systems or by preventing them to cause any harm. We follow the latter approach by elaborating on the approach to subjugate executed programs under a security...

  • McAfee gets in too deep. Buckley, Rob // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2012, p18 

    The article discusses the merits of joint technology from McAffee and Intel, its parent company. The Deep Defender security technology uses McAfee's DeepSAFE, which it has co-developed with Intel and has taken advantage of Intel's VMX virtualisation technology in moving anti-malware security to...

  • Malevolent web. Nallawalla, Ash // APC (Bauer Media Group);Feb2010, Vol. 30 Issue 2, p102 

    The article offers suggestions on how to counteract the malicious activities in the online marketing. It suggests to consider the CAPTCHA (Completely Automated Public Turing Test To Tell Computers and Humans Apart), a method which separates machines from humans. The avoidance on marketing links...

  • Malware Threats In 2012. Brandt, Andrew // Software World;Jan2012, Vol. 43 Issue 1, p23 

    The author discusses the threats of malware in 2012 in the U.S. The author believes that the use of the blog plugins of Wordpress.org is projected to become a future problem due to the massive malware of keylogger across the Internet and its vulnerabilities permit malware developers to upload...

  • Welcome to the Malware-Industrial Complex. Simonite, Tom // MIT Technology Review;May/Jun2013, Vol. 116 Issue 3, p16 

    The author reflects on computer security and the value of zero-day vulnerabilities in popular computer software. He states that zero-day exploits allow the insertion of software onto computers without detection by firewalls or antivirus software. He talks about the Stuxnet malware, believed to...

  • Ransomware Reads Victims' Browsers. Constantin, Lucian // PCWorld;Jun2013, Vol. 31 Issue 6, p39 

    The article focuses on ransomware, which is the term used to describe the installation of viruses or malware and the demand for ransom for its removal, and how ransomware authors have begun using browser histories to make the scams more believable.

  • Chinese Site Hit By Worm.  // Software World;Sep2009, Vol. 40 Issue 5, p24 

    The article reports on the increasing attacks of malwares through social networks. The recent Security Threat Report of Sophos PLC shows that 21.2% of the respondents had been on the sharp end of malware spread through a networking site. It notes that there are many Facebook clones in countries...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics