Saturday, March 8th, 2008
I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...
Posted in Hardware, Internet, Privacy, Security | 1 Comment
Saturday, March 8th, 2008
The US Federal Deposit Insurance Corporation (FDIC) is asking banks to warn their customers against logging into their accounts on public machines. Many computers used for public internet access have surveillance spyware installed on them. The spyware might take screenshots, record keystrokes and monitor web addresses visited; ... then send ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
The Anti-Spyware Coalition (ASC), a group of IT companies and public interest groups, is hoping to succeed where a previous vendor organization failed in tackling the global problem of spyware. The ASC released an agreed-upon draft definition of spyware this week that it hopes will promote public comment and ultimately ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Supreme Court Justice Potter Stewart famously said that he couldn't define obscenity, but that he knew it when he saw it.
The same has long been the case with spyware. It's not easy to define, but most people know it when parasitic programs suck up resources on their computer and clog ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does.
The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...
Posted in Internet, Privacy, Security, Software | No Comments