Anti-malware protection

June 2014
MacUser;Jun2014, Vol. 30 Issue 6, p32
The article takes a look at the apps from reputable companies that offer to protect from various kinds of malicious activity including viruses that might appear without warning. It cites the Flashback and Mac Defender as examples of a software that openly asks users to install it instead of sneakily reproducing. It notes that the major threats to Mac users are different forms of gullibility and suggests not entering credit card details into an app one did not ask for and do not know the source.


Related Articles

  • App-solutely Perilous? Security of Mobile Apps Spurs Concern. Acello, Richard // ABA Journal;Sep2011, Vol. 97 Issue 9, p2 

    The article offers information on the security issues arising from the new computer applications. It states that every new advanced technology application is affecting the computer security and leaving the mobile devices vulnerable to hackers. It mentions that the free iPad application Dropbox,...

  • Does Your Online Profile Say Something You Wouldn't? Brandt, Andrew // PCWorld;Aug2004, Vol. 22 Issue 8, p50 

    Malicious hackers can get access to a profile page in a couple of ways. Some Trojan horse programs, spread through regular e-mail or through the instant messaging service of the Internet service provider America Online (AOL), can log keystrokes as an AOL subscriber enters their user name and...

  • The PC security myth. Yates, Darren // Australian PC User;Nov2004, Vol. 16 Issue 11, p10 

    Presents an article discussing computer security. Information on JPEG file format as a carrier of computer virus; Interest of virus writers and security hackers in publicity from their viruses; Features of the Service Pack 2 software from Microsoft Corp.

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • Spyware needs to go. Rapoza, Jim // eWeek;12/1/2003, Vol. 20 Issue 48, p53 

    This article presents information on spyware, computer programs that hide inside installed applications and then use information on browsing habits to drive pop-up advertisements and other annoyances onto the system. Spyware has grown in popularity because it allows vendors of "free" utilities...

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • Don't let your PC turn into a zombie. GOLDSBOROUGH, REID // Business Journal (Central New York);3/23/2007, Vol. 21 Issue 12, p24 

    The article reports on the need for updated software to protect computer systems from hackers and prevent them from becoming zombies, which are computers that have been taken over by someone else over the internet and that works like a robot in behalf of the person who has taken it over....

  • Application exploits. Tippett, Peter // SC Magazine: For IT Security Professionals (UK Edition);Oct2006, p13 

    The article offers information on application software security exploits. Hackers perform this focusing on revenue. In pursuit of the operation, a significant attack objective has been compromising databases and data aggregations. Because of the security industry's collective work on securing...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics