Tuesday, May 13th, 2008
The mass SQL injection attacks we've mentioned here and here are increasing in numbers and we're seeing more domains being injected and used to host the attack files and we believe that there are now more than one group using a set of different automated tools to inject the code.
Previously ...
Posted in Internet, Security | No Comments
Monday, May 12th, 2008
ZoneAlarm ForceField provides a protective layer around your browser, shielding you from drive-by downloads, browser exploits, phishing attempts, spyware and keyloggers. So your passwords, your confidential information, and your financial data remain protected.
While traditional security, such as firewalls, antivirus, and security suites, protects your PC, ZoneAlarm ForceField protects your browser ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 12th, 2008
This definitely won’t be music to the ears of music aficionados who acquire their MP3s from peer-to-peer (P2P) networks, but it’s definitely not something they haven’t heard of either.
A host of adware under the guise of media files on P2P networks have been reportedly raking up numbers of victims on ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, May 12th, 2008
Google's new Web Security for Enterprise service enables companies in the US and Europe to safeguard their internet traffic with protection against viruses and spyware and malicious URLs. According to Google the system "powered by Postini, stops web-borne spyware and viruses before they infiltrate your network and compromise or disable ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, May 12th, 2008
Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings.
Read the rest of the story and view the map...
Posted in Internet, Privacy, Security | No Comments