Tuesday, January 6th, 2009
LinkedIn is a popular social networking site where you can manage business contacts online. Since you can set up a profile with links to your own website, it seems to attract criminals’ attention as well. A Google search reveals that several hundred fake LinkedIn profiles from nude “Kirsten Dunst” to ...
Posted in Coding, Internet, Privacy, Security | No Comments
Monday, January 5th, 2009
Days after a wave of phishing attacks fooled thousands of Twitter users, it appears that another security hole has been found by...someone. Obama's account, unused since election day, sent out an affiliate link to a survey with a gas card prize, Fox News said that "Bill O'Reily is gay" (not ...
Posted in Internet, Privacy, Security | No Comments
Monday, January 5th, 2009
A new trojan once again underscores the importance of exercising caution when downloading. Disguised as a keygen, Troj/Qhost-AC is one of the strangest pieces of malware I've seen.
The trojan doesn't appear to be particularly malicious. Its mission: to prevent you from downloading torrents from PirateBay and Mininova, keep you from ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, January 5th, 2009
Do not expect that your system would start misbehaving once it is infected by a malware. Malwares can perform their functions without showing any symptoms for days, months or years. New malwares are capable of hiding themselves even from powerful Antivirus scan engines. They can also perform their jobs without affecting ...
Posted in Coding, Internet, Security | No Comments
Sunday, January 4th, 2009
This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities.
Although all browsers ...
Posted in Coding, Internet, Security | No Comments