Jul 8, 2008 6 min read Jul 8, 2008 Malware Lab Data under threat This guest article by Flavius Saracut deals with the common data loss risks and how you can avoid them by doing data backups. Common reasons of data loss: Even with the most reliable computer hardware and software, there is always the possibility of something going wrong. The most common causes of data loss include: Human […]
May 5, 2008 9 min read May 5, 2008 Malware Lab Anonymous in the Internet? This guest article by Frank Richter (www.security-dome.eu German) deals with questions such as “Is it possible to navigate the Internet anonymously?” and “What anonymization methods can be used to leave fewer traces without endangering my own security?”. Technical basics: When Internet pages are called up, particular technical processes occur that provide larger or smaller amounts […]
Dec 5, 2007 3 min read Dec 5, 2007 Malware Lab Signature recognition or behavioral analysis – Which is better? If you closely read the program description of Emsisoft Anti-Malware you will probably notice the term “real-time protection”. Sounds good, sounds safe. However, what this really means and what technology lies behind this is not always clear to those who are not IT experts. This is reason enough for us to put aside all the […]
Aug 20, 2007 3 min read Aug 20, 2007 Malware Lab A Story About Government Malware – The Federal Trojan The term “Federal Trojan” has been dominating media reports for several months and is currently a hot topic in almost every forum. In the following article we summarize what this is all about and explain our position as a manufacturer of security software. Let us journey back in time to Germany in the year 2005. […]
Jan 20, 2007 3 min read Jan 20, 2007 Malware Lab Spyware Traces in Detail In December of 2006, a total of over 150,000 Malware infections were reported by the Emsisoft Anti-Malware Scanner. The actual figure including all those not reported is probably much higher. According to this statistic, one could think that almost every computer was infected with one or more types of Malware before Anti-Malware was used. Well […]