Tuesday, May 6th, 2008
You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?
A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they ...
Posted in Hardware, Privacy, Security | No Comments
Monday, May 5th, 2008
Researchers have discovered a new, complex spam attack that uses a sophisticated ruse to fool users into downloading malware.
The exploit, which researchers at BitDefender call "a spam-sending scheme of Byzantine complexity," features spam messages that claim to contain links to videos. When users try to click and see the video, ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 5th, 2008
So you want to bank safely online? Then ditch your computer and make the transaction via your cell phone instead.
Using a mobile handset for this most sensitive online act might sound counterintuitive, given that phones are prone to being lost or stolen, but your cell phone might actually be safer ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 1st, 2008
As if computer viruses and worms aren't enough of a nuisance, malicious hardware, which will be much more difficult to detect, could soon become a threat too.
Today, computer viruses, which are programs downloaded either as an email attachment or when someone visits a website, are responsible for most computer attacks. ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, May 1st, 2008
The fundamental problem with two factor (2FA) session authentication is that the approach is vulnerable to Man in the Middle and Man in the Browser attacks. 2FA requires that customers present not only a password (something they know) when they log into online banking, but also demonstrate that they possess ...
Posted in Internet, Privacy, Security | No Comments
Page 15 of 26« First«...10...1314151617...20...»Last »