Lenovo using rootkit-like tool to reload their software on clean Windows installs
It seems that year 2015 is not a great year for Lenovo in terms of publicity. In fact, there have been several issues with their...
Computer Cleanup Time!
Woke up this morning and had a discussion with a couple friends regarding PC performance and sluggishness. So figured it was time to review technojunkyard's ...
The Company Securing Your Internet Has Close Ties to Russian Spies
Kaspersky Lab sells security software, including antivirus programs recommended by big-box stores and other U.S. PC retailers. (more…)
SuperFish Removal
Lenovo, the world's largest PC manufacturer, has been installing a dangerous piece of adware on its consumer laptops. The software, called Superfish, leaves computers vulnerable...
Trend Micro predicts Targeted Attacks on the Rise worldwide
Trend Micro Incorporated, has released its annual security predictions report, "Trend Micro Security Predictions for 2015 and Beyond: The Invisible Becomes Visible," and the company's...
Akamai Warns of IptabLes and IptabLex Infection on Linux, DDoS attacks
CAMBRIDGE, Mass., Sept. 3, 2014 -- Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications,...
Researcher Details USB-Based Attack That Circumvents All Known Protective Security Measures
Security research Karsten Nohl of Berlin's SR Labs has revealed a flaw in USB devices that potentially allows hackers to evade all known security measures...
WANTED: Russian Evgeniy Bogachev sought over cybercrime botnet
The US has charged a Russian man with being behind a major cybercrime operation that affected individuals and businesses worldwide. Evgeniy Bogachev, said to be...
Cryptolocker: what you need to know
What happens when a computer is infected with the malicious software or a virus, and what should you do to protect your files? Cryptolocker is...
Malware communicates at a distance of 65 feet using built-in mics and speakers.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes...