Saturday, March 8th, 2008
A significant portion of spyware is designed specifically to steal identities, underscoring the trend toward more malicious use of such software by criminals, said a security firm Wednesday.Fifteen percent of the 2,000 known spyware threats analyzed by Aladdin Knowledge Systems over a two-month span send private information gathered from the ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Yahoo is playing host to thousands of phishing sites and doesn't have sufficiently well-trained staff to address the problem of online fraud, according to a leading anti-spam and security organisation on Tuesday.Richard Cox, chief information officer of Spamhaus, told an audience of politicians, security experts and law enforcement officials that ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
What's accessible to the average person about your Web site? It could be more than you bargained for. Even if pages are hidden from view, confidential files about customers and employees could be just a search phrase away.
Google.com keeps a massive index of Web pages and files on the Web. ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
Need examples of why spyware is so insidious? Headlines from the last few months are full of them, said Richard Stiennon, VP of threat research for Boulder, Colo.-based security firm Webroot. Spyware probably contributed to the data thievery companies like Lexis-Nexis, BJ's Wholesale Club and Bank of America suffered, he ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...
Posted in Hardware, Internet, Privacy, Security | 1 Comment