Wednesday, April 23rd, 2008
(Source: Sunbelt Software) The volume of spam e-mails sent has increased exponentially during recent years, and so has the cost of dealing with that spam. This paper will examine the ways in which spam can impact an organization's profits and outline the criteria to consider when choosing an anti-spam ...
Posted in Internet, Privacy | No Comments
Wednesday, April 23rd, 2008
CAPTCHAs are becoming both ubiquitous and useless. When you visit many web sites, you have to decipher some tough-to-read text and enter it in a box before you can leave a comment or send an email. But hackers are getting better and better at developing automated systems to crack CAPTCHAs, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 22nd, 2008
Criminals changed tactics in the last six months of 2007, dropping malicious email in favour of Web-based attacks, according to data reported to Microsoft by Windows users.
The company saw the number of Trojan downloader programs it removed from Windows machines jump by 300 percent, according to Jimmy Kuo, principal architect ...
Posted in Internet, Privacy, Security | No Comments
Monday, April 21st, 2008
With all the high storage devices like the iPod classic going up to 160GB and just fitting in your inside pocket, people are getting more scared of data loss. Even Dave Lewis from Liquidmatrix recently saw someone at a client site using an iPod to pull corporate data onto it ...
Posted in Hardware, Security | No Comments
Monday, April 21st, 2008
Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...
Posted in Internet, Privacy, Security | No Comments