Tuesday, March 11th, 2008
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the ...
Posted in Privacy, Security, Software | No Comments
Tuesday, March 11th, 2008
A serious Gmail account hacking backdoor, has been found in the popular Gmail archiving software G-Archiver. This application, in all its innocence, allows you to download and backup all emails from your GMail account. But apparently the developer included the code to send an email to his email ID with ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Monday, March 10th, 2008
The US-CERT has published a warning on active exploitation of a vulnerability in Microsoft Excel, described in Microsoft Security Advisory 947563. We can confirm these attacks and have been tracking several exploits over the last few days.
It should be noted that the incidents we are aware of have been limited to a very ...
Posted in Security | No Comments
Monday, March 10th, 2008
Microsoft's Password Checker does not collect, store, or transmit information beyond the computer that you use to access Password Checker. The image works on your computer desktop until you navigate away from the page.
The security of the passwords entered into Password Checker is similar to the security of the password ...
Posted in Internet, Security | 1 Comment
Sunday, March 9th, 2008
Sunbelt Software is reporting a wave of spam pushing a new variant of backdoor trojan malware.
The spams they show all advertise "3D BeST Screensaver" or "3D Flsh screen$aver" or something like that; "Download for free" and a link. The pages to which the links take you are well-executed and look ...
Posted in Internet, Security | 1 Comment