Computer security technologists are racing to find ways to block ever-more complex computer worms and viruses that burrow into computers -- usually via e-mail -- and wreak havoc on network systems.
Around the world this week, digital worms have been invading computers at hundreds of thousands of offices and homes. The so-called "Blaster" worm, and variations of it, bog down networks as they ...
When we say that a PC or a phone has got a virus, is it the same as saying that it has a worm? No. Both are forms of malware but are very different from each other. Malware is a malicious software ...
Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the ...
Some say we're living in a "post-PC" world, but malware on PCs is still a major problem for home computer users and businesses. In this second installment in the Ars Guide to Online Security, we'll ...
Network behavior analysis is one of the most robust and scalable security technologies. At the core of network behavior analysis are anomaly-based algorithms used to identify emerging threats. To stop ...
I was happily dreaming about a well-secured network when the beeping of my cell phone woke me. It was the office. I’d been away from work for a few days and was making an effort not to read my e-mail ...
On the Internet's 40th anniversary, Symantec lists the worst cyber threats. Sept. 3, 2009 — -- This fall marks the 40th birthday of the Internet, and to celebrate it, Symantec, the manufacturer ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results