Saturday, March 8th, 2008
Internet Explorer is also susceptible to the attack but is less likely to be tricked because it does a more thorough job in checking to see where a log-in form is coming from before it automatically submits password and user information.A flaw in Firefox allows you to steal user information ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
SUMMARY
The My Computer security zone contains settings for how Windows and Internet Explorer manage unsigned controls. This security zone is hidden by default on the Security tab in the Internet Options dialog box. This article describes how to to view and modify the settings for the My Computer security zone ...
Posted in Internet, Security, Windows | No Comments
Saturday, March 8th, 2008
A tricky malicious program has become more prevalent in spam, but experts don't know what its creators plan to do with it.Many vendors are rating the malware--called "Warezov," "Stration," and "Stratio"--as a low risk. But they also say that it is tricky to deal with.
New Code Every 30 MinutesThe malware ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Security experts have discovered new spambot software that installs its own anti-virus scanner to eliminate competition, alongside a number of other sophisticated features.
SecureWorks has described the Trojan, which it calls SpamThru, in detail. Others vendors have come up with different names for the software. One of the signs of its ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
The tracer software that Hewlett-Packard investigators used to try to sniff out boardroom leaks sounded like it had been ripped from the pages of a bad science-fiction novel. That is, until the company began talking about it in detail at a congressional probe into the spying scandal.The technology tool the ...
Posted in Internet, Privacy | No Comments