Security > Malware

Kaspersky leads anti-malware ranking

28 April, 2014 by Dylan Bushell-Embling

Kaspersky, Emisoft, Avira and BitDefender all blocked 99.8% of malware from live malicious URLs during a comparative test, and Kaspersky also scored highest on detecting malicious files.


Cybercrims exploit missing flight MH370 concerns

20 March, 2014

Cybercriminals are using the mystery surrounding missing Malaysia Airlines Flight 370 as a way to infect unsuspecting internet users with malware.


Ads pass explicit content as top mobile threat vector

13 March, 2014 by Dylan Bushell-Embling

Malicious mobile ads have passed explicit content as the top content exposing users to mobile threats, but explicit content remains the most potent threat, according to Blue Coat Systems.


Pace of malware attacks doubled in 2013

03 March, 2014 by Dylan Bushell-Embling

A malware attack on enterprises occurred once every 1.5 seconds in 2013, and there were command and control servers in nearly every country worldwide, according to FireEye.


Android dominates mobile threat landscape

26 February, 2014 by Dylan Bushell-Embling

Android appears to have emerged as the platform of choice for mobile malware authors, accounting for more than 96% of all infections traced by FortiGuard Labs during 2013.


Kaspersky and Absolute feud over vulnerability allegations

17 February, 2014 by Dylan Bushell-Embling

How hard are security companies expected to try to contact vendors before publishing reports that may cast their products in a bad light? The controversy ensuing from a report published last week by Kaspersky Lab revolves around this question.


Top 5 malware trends for 2014 and how to combat them

23 January, 2014

This paper discusses the top five malware trends to watch out for in 2014 and how important it is to have a security solution that provides endpoint protection. Download now.

 


Yahoo! ad malware attack worse than thought

14 January, 2014 by Andrew Collins

A recent malware attack that saw Yahoo! serving malware to users of its websites affected more users than originally thought and may have caused affected computers to become 'bitcoin slaves', generating bitcoins for the attackers.


CryptoLocker: your money or your life

18 December, 2013

A new form of malware called CryptoLocker has recently been identified. It is designed to extort money from victims by denying them access to their personal computer files. It targets all Windows operating systems and once infiltrated, files are destroyed unless a ransom is paid.

Download this white paper for more information on this new form of ‘ransomware’ and how the Webroot SecureAnywhere solution can help. 


Australia prime target for banking malware

11 November, 2013 by Dylan Bushell-Embling

Australia is a popular target for online banking malware, iOS phishing sites and command and control attacks, according to research from Trend Micro.


Reinventing antivirus

09 September, 2013

This white paper covers how cloud architecture and behaviour recognition are changing the security game and making traditional antivirus obsolete. Download now. 


Phishing 2.0

09 September, 2013

This white paper covers why phishing is back as the No. 1 web threat and how web security can protect your company. Download now. 


Cybercrooks using Google Cloud Messaging to target Android

19 August, 2013 by Dylan Bushell-Embling

Google's Cloud Messaging Service, used to let Android app developers interface with their programs, is attracting the attention of malware authors.


Mobile devices: the next internet security target 

22 March, 2013 by Jonathan Andresen, Blue Coat Systems

Malnets are a lucrative source of income for distributors and they are becoming more sophisticated everyday. How can your business stay ahead of the distributors to protect your business?


Antivirus shootout cuts scan time from three hours to three minutes

05 February, 2013 by Andrew Collins

The Royal Flying Doctor Service Western Operations (RFDSWO) has implemented a new antivirus system, cutting full system scan times from about three hours to under three minutes, and increasing the performance of endpoint machines.


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd