Tuesday, April 22nd, 2008
Criminals changed tactics in the last six months of 2007, dropping malicious email in favour of Web-based attacks, according to data reported to Microsoft by Windows users.
The company saw the number of Trojan downloader programs it removed from Windows machines jump by 300 percent, according to Jimmy Kuo, principal architect ...
Posted in Internet, Privacy, Security | No Comments
Monday, April 21st, 2008
Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...
Posted in Internet, Privacy, Security | No Comments
Friday, April 18th, 2008
One of the things I love about cutting-edge technology is the way we get to invent fun, new terminology. It seems to have been around before, but I just came across my first reference to "whale phishing." It describes a phish where the target is a very important person, such ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
PayPal says allowing customers to make financial transactions on unsafe browsers "is equal to a car manufacturer allowing drivers to buy one of their vehicles without seat belts."
PayPal, one of the brands most spoofed in phishing attacks, is working on a plan to block its users from making transactions from ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.
What information is ...
Posted in Internet, Privacy, Security | No Comments