Saturday, March 8th, 2008
Newsday is running a piece on bogus spyware applications that mimic successful free applications (like Spybot and AdAware), but either don't work, or worse: install spyware themselves. The article quotes Eric Howes, a BBR security forum regular, who maintains a list of 75 such suspect products, with more being added ...
Posted in Security | No Comments
Saturday, March 8th, 2008
The spyware threat to enterprise security will increase over the next few years without an enterprise-class tool to prevent it, consulting firm META Group warns.
Spyware has both good and bad properties that make it difficult for traditional antivirus software to identify and clean up, leaving only a handful of consumer ...
Posted in Security | No Comments
Saturday, March 8th, 2008
The Internet Storm Center has announced a very scary discovery. They have found a browser hijacker, installed as a Browser Helper Object (BHO), that will monitor what are supposed to be secure, encrypted browsing sessions and steal passwords. These passwords then are forwarded to a web based script at www.refestltd.com. ...
Posted in Security | No Comments
Saturday, March 8th, 2008
What I am about to suggest may not be the most correct method to remove a BHO from your system. In fact, there is no guarantee that instructions below will resolve your issue. What I can tell you, however, is that I have used the following methods to safely remove ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
Mike Healan
March 23, 2004
If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...
Posted in Privacy, Security | No Comments
Page 17 of 19« First«...10...1516171819»