Jun 29 2011
This article is a continuation of the previous report on keyloggers. It offers a detailed analysis of the technical aspects and inner workings of keyloggers.
Sep 30 2010
These days, when you scan Internet resources or take part in discussions, you inevitably come across materials and comments related to the use of cloud technology in antivirus protection.
Apr 24 2009
Every era has its buzzwords and the IT sector is no different: "multimedia" in the 80s, "interactive" in the 90s, and ”web 2.0” in the last few years. And just when everyone’s starting to get comfortable with the most recent piece of terminology, along comes another one.
Dec 21 2007
This paper presents a method to automatically separate and block those networks in real time. The method uses a statistical approach exploiting the fact that computers in a botnet have to have some similarities in their behavior.
Dec 20 2007
A firewall provides security which is additional to that provided by other security solutions and appliances. Additional security is becoming increasingly relevant due to the increase in the number of new malicious programs.
Nov 07 2007
This article provides an overview of methods used to detect malicious code; of the functional (and to some extent chronological) connections between these methods; and of their technological and applied features
Jul 20 2007
The article compares two different methods for protecting confidential data - the traditional one, and an alternative approach based on analyzing application activity.
Mar 29 2007
This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to protect against them.
Mar 16 2007
The fact that it’s easy to encrypt a network channel and the fact that in most cases there will be no verification of who created the file results in a contradictory situation: a “secure connection” to a server provides the user with a feeling of security, but does not guarantee that the connection will be free from malicious data.
Jan 24 2007
Microsoft’s latest development, Windows Vista, is positioned as a system with enhanced security. The official release data is scheduled for 30th January 2007. However, questions as to how realistic the claims of enhanced security are were being raised by the computing community long before a...
Jan 18 2007
This latest report examines the development of cybercrime and the relationship between cybercriminals, the IT security industry and other organizations.
Jun 28 2006
The first in a series of articles that discuss the newest technologies used by antivirus companies which focuses on proactive technologies