What the Tech logo
Please visit our forums for help with malware removal or any tech support question. Take me to the forums!

Join members of TomCoyote and other security sites for a live chat! We invite you to attend an Q&A with the Microsoft Security MVPs. In this chat the MVP experts will answer your questions regarding online safety issues such as phishing, spyware, rootkits as well as server related topics. If you have questions on how […]

  • Comments Off on Q&A with the Security MVP Experts

Google named worst privacy offender in study

A new report puts Google in last place when it comes to privacy protection. Despite recent moves to anonymize server logs and other pro-privacy gestures, Privacy International called the company “an endemic threat to privacy.” Only Google earned the dismal “black” color bar from the group, which has just issued a report on Internet privacy […]

  • Comments Off on Google named worst privacy offender in study

Symantec announced late today a free public beta for its new Norton AntiBot software that attempts to identify malware on your system by analyzing its behavior. The stand-alone software is based on existing (and currently available) technology from Sana Security, with a few minor add-ins from Symantec’s SONAR behavioral scanning technology that is now included […]

“The State of Search Engine Safety,” a recent study by McAfee’s SiteAdvisor group, has some classic good news and bad news for Internet surfers. Using several automated techniques, the SiteAdvisor study determined that 4 percent of the query results offered by the major search engines lead to potentially dangerous Web sites, and the total for […]

  • Comments Off on McAfee Study Finds 4 Percent of Search Results Malicious

Security researcher Robert Hansen, aka RSnake, has published details of a new attack on Google Desktop. Basically, Hansen found a man-in-the-middle attack, this time placing an attacker between Google and someone launching a desktop search query. From this position, the attacker is able to manipulate the search results and possibly take control of other programs […]