Saturday, March 8th, 2008
Wireless LANs utilize radio waves for transporting information, which results in security vulnerabilities that justifiably worry network managers. To assuage those worries, most companies implement authentication and encryption to harden security. However, WLANs have a whole host of other vulnerabilities that can be more difficult to completely smother such as ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
A new website has been built to educate British online consumers about the dangers of phishing scams.
The Phishing IQ Test has been set up with faux emails from banks and e-commerce vendors, and users are invited to judge whether they are legitimate or not.
A results page reveals the correct answers ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
So says the Radicati Group, which Wednesday released preliminary results of a survey showing that it's bad behavior on the part of users -- us, in other words -- driving the spam and virus threat.
And you thought it was spammers and hackers.
"Frankly, it surprised us that users ...
Posted in Internet, Privacy | No Comments
Saturday, March 8th, 2008
Quick! Run for the hills! Firefox spyware is running rampant and infecting every computer in sight!
*sigh*
Sometimes I just want to bang my head on the desk and keep doing it until the desk surrenders unconditionally. If you were to believe several online news sites, there is an epidemic ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
A doctoral student at the University of California has devised a means of fingerprinting a computer and tracking that computer across the internet. This fingerprinting defeats all known methods of hiding the identity of a computer. Attempting to use proxy servers, NAT firewalls, routers or any other methods fail to ...
Posted in Privacy, Security | No Comments