- Posed by a SearchWindowsSecurity.com reader
Windows security threats expert Kevin Beaver offers this response:
Selecting the proper antivirus software
Now that you know the difference between the different types of malware removal and protection tools, get help choosing the best antivirus program for your network. Taken from a live thread in the ITKnowledge Exchange forum, this discussion will give you a look into your peers' favorite antivirus programs.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Next generation spyware
Once considered simply an annoyance, the spyware attack vector is increasingly being used with more malicious intent. The distinction between adware and spyware was primarily a difference between whether a vendor was up front with disclosing its monitoring activity, or if the vendor secretly "spied" on the user without any notification or authorization. The worst effect of such spyware was typically unwanted pop-up advertising based on the monitoring that the spyware had carried out. Read more about the evolution of spyware in this tip from Tony Bradley.
About the author: Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic LLC. He has nearly two decades of experience in IT and specializes in performing information security assessments regarding compliance and risk management. Kevin has authored/co-authored six books on information security including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) as well as The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He's also the creator of the Security On Wheels information security audio programs providing security learning for IT professionals on the go. Kevin can be reached at firstname.lastname@example.org.