Tuesday, March 18th, 2008
I'm not sure if this is an isolated incident or another mass attack through third party advertising like what had happened with Facebook a while back, but the folks over at ha.ckers.org are reporting a case where one of their users was browsing their Yahoo Mail account and got hit with ...
Posted in Coding, Internet, Privacy, Security | 2 Comments
Saturday, March 8th, 2008
Spammers have begun using come-ons such as stock-pushing images as e-mail stationery backgrounds to evade antispam technology and shovel their unwanted messages into your inbox.
One antispam vendor has spotted the technique in its early stages, but expects we'll see more of it. In a sample e-mail, the subject read 'GED' ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
The tracer software that Hewlett-Packard investigators used to try to sniff out boardroom leaks sounded like it had been ripped from the pages of a bad science-fiction novel. That is, until the company began talking about it in detail at a congressional probe into the spying scandal.The technology tool the ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Peter Shinbach recently threw in the towel and shut down Bach Door, his online-communications blog.The public relations executive from Birmingham, Michigan, was fed up with so-called comment spam. Returning from a weeklong vacation, he found a slew of comments on his blog that had nothing to do with communications: They ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
In the last newsletter, I suggested creating a limited user account on your computer and using that to surf the internet. As a limited user, it becomes very difficult for malware to attack the browser and install itself. As it turns out, there is an even simpler way to do ...
Posted in Internet, Privacy, Security | No Comments