These days, when you scan Internet resources or take part in discussions, you inevitably come across materials and comments related to the use of cloud technology in antivirus protection. Read Full Article
Crimeware: A new round of confrontation begins…
This article provides an analysis of recent developments regarding attacks launched by malicious programs against the clients of financial organizations. Read Full Article
Malware Miscellany, September 2009
After a lengthy interlude, we’re renewing our monthly malware almanac by popular demand. Read Full Article
Malware Miscellany, December 2008
Greediest malicious program targeting payment systems, stealthiest malicious program, most widespread malicious code which exploits a vulnerability, most malicious program and others. Read Full Article
Malware Miscellany, November 2008
Greediest malicious program targeting payment systems, stealthiest malicious program, most widespread malicious code which exploits a vulnerability, most malicious program and others. Read Full Article
Malware Miscellany, October 2008
Greediest malicious program targeting payment systems, stealthiest malicious program, most malicious program and others. Read Full Article
Malware Miscellany, September 2008
Greediest Trojan targeting banks, stealthiest malicious program, most common vulnerability on the Internet, most common Trojan family and others. Read Full Article
Malware Miscellany, August 2008
Greediest Trojan targeting banks, stealthiest malicious program, most widespread malicious code which exploits a web vulnerability, most common Trojan family and others. Read Full Article
Malware Miscellany, July 2008
Greediest Trojan targeting payment systems, stealthiest malicious program, most common vulnerability on the Internet, most common Trojan family and others. Read Full Article
Malware Miscellany, June 2008
Greediest Trojan targeting payment systems, stealthiest malicious program, most common Trojan family most common malicious program in email traffic and others. Read Full Article