Search Results for
POS
Security in VoIP Systems
One of the tasks of security companies is to "forecast" what will happen in the future based in the data and trends we observe. This…
Think you're protected? Think again
For many years the security industry has been saying that in order to be correctly protected, users should have an anti-malware and firewall solution installed…
Malware articles in Virus Bulletin
Taking a look at McAfee's Blog, I've seen a post talking about an old "friend" of us: the virus Virutas, and I have realized that…
Windows Vista spotted in-the-wild
I just read an interesting post by Alex about adoption of Windows Vista. We recently finished a three month research study to discover infection rates…
Automatic classification of malware
Last year we posted an article about graphic representations of malware, in which we commented that it's possible to automatically identify and classify malware into…
September spyware list
This month, there have been no changes in the first positions of the ranking, so the list remains the same as last month’s: 1.-…
Virus Bulletin 2007
To avoid publishing 2 similar posts, here you are a link to Panda Research blog about the last Virus Bulletin, where I did one of…