• Posted Feb. 7, 2017, 12:12 p.m. - 7 years, 10 months ago

Malware File Types Changing to Look less Suspect

Attack on computerFollowing on from our previous post about the State of Malware report from Malwarebytes last week, a new warning has …

[More …]

  • Posted Feb. 2, 2017, 2:58 p.m. - 7 years, 10 months ago

Are You on Top of Your Malware Prevention Practices?

Malware downloadWith the latest State of Malware report from Malwarebytes stating that Europe is the continent most riddled with malware, what …

[More …]

  • Posted Feb. 3, 2016, 2:48 p.m. - 8 years, 10 months ago

The Origins of the Term “Trojan Horse”

Trojan horse

As developers, we’re aware that some of the lingo we speak as our “native language” perhaps isn’t used …

[More …]

  • Posted Sept. 14, 2015, 2:36 p.m. - 9 years, 3 months ago

Managing Malware & Virus Risks in PDF Documents

Malware

Whilst we boast that Infix is immune to all PDF viruses, not all PDF viewers or editing programs can say …

[More …]

  • Posted July 30, 2015, 3:59 p.m. - 9 years, 4 months ago

Security Vulnerabilities in Open Source Programs

Open Source

Using open source software can have its benefits – the quality can be better than when using proprietary programs, as more …

[More …]

  • Posted March 28, 2015, 11:50 a.m. - 9 years, 9 months ago

Avoiding Malware Threats

Secure Computer

 

Back in December, we wrote about the common malware threats that can attack PDF documents, especially the CVE-2014-0496 threat, classed …

[More …]

  • Posted Dec. 23, 2014, 12:47 p.m. - 10 years ago

Common Malware Threats within PDF Documents

Mal – Malicious. Ware – Software. MalWare

Malware has been around almost as long as the internet has, and there will always …

[More …]