Friday, April 18th, 2008
The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of ...
Posted in Internet, Privacy, Security | No Comments
Friday, April 18th, 2008
One of the things I love about cutting-edge technology is the way we get to invent fun, new terminology. It seems to have been around before, but I just came across my first reference to "whale phishing." It describes a phish where the target is a very important person, such ...
Posted in Internet, Privacy, Security | No Comments
Friday, April 18th, 2008
A bot is a computer program installed on a compromised machine which offers an attacker a remote control mechanism. Botnets, i.e., networks of such bots under a common control infrastructure, pose a severe threat to today’s Internet: Botnets are commonly used for Distributed Denial-of-Service (DDoS) attacks, sending of spam, or ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
PayPal says allowing customers to make financial transactions on unsafe browsers "is equal to a car manufacturer allowing drivers to buy one of their vehicles without seat belts."
PayPal, one of the brands most spoofed in phishing attacks, is working on a plan to block its users from making transactions from ...
Posted in Internet, Privacy, Security | No Comments
Thursday, April 17th, 2008
You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide.
What information is ...
Posted in Internet, Privacy, Security | No Comments