Saturday, March 8th, 2008
The vast majority of worms and other successful cyber attacks are made possible by vulnerabilities in a small number of common operating system services. Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools. They ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
New spam emails can turn vulnerable PCs into spam-spreading 'zombies'.
The spam has a link which purports to allow users to opt out of future emails. However, MessageLabs, an e-mail filtering company, warns that these links are part of a scam and, if clicked on, will turn a victim's PC into ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
Users should be wary of pressing the 'click here to remove' link on spam messages because it serves to confirm to spammers that junk mail messages are being read. Such email addresses can be sold at a premium to other spammers.
That's reason enough to simply delete spam messages, but a ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Scott Rolf knows trouble when he sees it. An IT director for a law firm near Cleveland, Ohio, Rolf was asked by a friend to check out the new Web site the friend had put up on a DSL-connected Web server. Rolf did more than just visit his friend's site; ...
Posted in Hardware, Internet, Security | No Comments
Saturday, March 8th, 2008
Computer viruses spread by e-mail are growing more sophisticated as virus writers and spammers are thought to be joining forces in an effort to make smarter bugs, a computer security group said Tuesday.
New York-based MessageLabs, which scans client e-mails for viruses to block, said it picked apart some ...
Posted in Internet, Security | No Comments