Thursday, April 3rd, 2008
Spammers are once again using web bugs to verify the validity of of email addresses. This time the trick is not done with graphics but with digital certificates. Alexander Klink from German consultants Cynops has discovered a vulnerability in Microsoft products – or possibly in the Crypto API – that ...
Posted in Coding, Internet, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
Around a tenth of all malware is designed to use portable storage media, such as removable USB drives, as an attack and spread vector.
Security firm ESET said that 10.3 per cent of malware detections last month were identified as files containing information on programs to be run automatically when removable ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Monday, March 31st, 2008
A wave of April Fool's Day related Storm mails have just been sent out. Similar as the other times with a link that points to an IP address.
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, March 30th, 2008
Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor.
Among other activities, MarkMonitor tracks phishing attacks that target brand names.
Researchers compiled a list of 750 Google search terms that are used to track down ...
Posted in Internet, Privacy, Security | No Comments
Sunday, March 30th, 2008
When you are doing a Business Impact Analysis or a Risk Assessment, you will often find that email, be it internal or external, is one of the systems that people think they cannot live without. They might even be right. Email systems are being used as communications tool, storage system, ...
Posted in Internet, Privacy, Security | No Comments