Tuesday, August 26th, 2008
Criticize the people behind the Asprox botnet, and they take it personal—so much so that they will bombard you with malware, according to a report by SecureWorks.
The botnet, now at least 50,000-strong with bots, is sending out phishing e-mails posing as messages from banks in the United States and United ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, August 20th, 2008
Although Windows XP was Microsoft's preferred desktop operating system for an unprecedented length of time, it became something of a PR nightmare for the software giant. Windows XP is full of security holes and is very easy to compromise. When Microsoft created Windows Vista, its primary goal was to address ...
Posted in Internet, Networking, Security, Windows | No Comments
Wednesday, August 6th, 2008
In my recent Editors' Notes post on Consumer Reports' recommendation that Mac users dump Safari because the Apple browser lacks the anti-phishing tools of Firefox and Opera, I focused on behavioral changes one can make that minimize the risks of phishing attempts. I didn't, however, discuss a relatively simple configuration ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, July 23rd, 2008
Security researcher Aviv Raff said on Wednesday that the iPhone's Mail and Safari applications are prone to URL spoofing and could allow phishing attacks against iPhone users.The alert was anticipated. Prior to the release of the iPhone on July 11, Raff was one of a few security researchers who indicated ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Tuesday, July 22nd, 2008
Phishers are doing their homework. The conventional way is to ask users to update their accounts by asking them to click a certain link. A phishing email usually displays legitimate URL or a hyperlink. Upon clicking, the user will be redirected to the phishing Web site.
But now, there’s no URL ...
Posted in Internet, Privacy, Security | No Comments