Monday, April 14th, 2008
The first thing is to isolate the computer (no more trading floppies until you're done) and then begin to disinfect it.
One of my favorite tools is Knoppix. The great thing about this Linux distribution is that you don't have to know anything about Linux in order to be able to ...
Posted in Internet, Security | No Comments
Sunday, April 13th, 2008
First it was do-it-yourself malware and phishing toolkits, then it was specialized sites selling stolen FTP credentials and credit card accounts, and now it’s the next phase in cybercrime: crimeware as a service.
Researchers at Finjan, MarkMonitor, and Trend Micro are among those seeing a new cybercrime business model, where ...
Posted in Internet, Privacy, Security | No Comments
Sunday, April 13th, 2008
Cybercriminals have created a global business with a supply chain every bit as organized and sophisticated as that of any legitimate business. The difference is that cybercrime takes advantage of unsuspecting consumers and insecure businesses to steal untold amounts of money.
According to security experts and spam fighters speaking at a ...
Posted in Internet, Privacy, Security | No Comments
Saturday, April 12th, 2008
The world has a new culprit to blame for the rising tide of software vulnerabilities -- code outsourcing.
The trend to outsource the coding of applications is now a major contributor to making business software more vulnerable, a survey-cum-report has claimed.
According to analyst group Quocirca, which surveyed 250 IT directors and ...
Posted in Coding, Internet, Security, Software | No Comments
Saturday, April 12th, 2008
If you're running Windows Vista, you're familiar with User Access Control (UAC). It's the security subsystem that pops up those irritating dialog boxes asking whether you really want to install software, or modify system files, or write to the Registry.
UAC may be Vista's most-hated feature, but as it turns out, ...
Posted in Internet, Security, Windows | No Comments