Saturday, March 8th, 2008
I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...
Posted in Hardware, Internet, Privacy, Security | 1 Comment
Saturday, March 8th, 2008
The US Federal Deposit Insurance Corporation (FDIC) is asking banks to warn their customers against logging into their accounts on public machines. Many computers used for public internet access have surveillance spyware installed on them. The spyware might take screenshots, record keystrokes and monitor web addresses visited; ... then send ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
The Anti-Spyware Coalition (ASC), a group of IT companies and public interest groups, is hoping to succeed where a previous vendor organization failed in tackling the global problem of spyware. The ASC released an agreed-upon draft definition of spyware this week that it hopes will promote public comment and ultimately ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Supreme Court Justice Potter Stewart famously said that he couldn't define obscenity, but that he knew it when he saw it.
The same has long been the case with spyware. It's not easy to define, but most people know it when parasitic programs suck up resources on their computer and clog ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments