ID Theft Keylogger Examined

Saturday, March 8th, 2008

I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...

Disable ActiveX for safer Web browsing

Saturday, March 8th, 2008

Unfortunately, ActiveX controls are ideal tools for those who would attack your computer. Over the years, Internet Explorer has been their favored vehicle. It was built to take advantage of ActiveX controls. These controls pose a serious security threat that outweighs their benefits. So it's important to take steps to protect ...

USB Devices Can Crack Windows

Saturday, March 8th, 2008

Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device, according to an executive from SPI Dynamics, which discovered the security hole. The buffer-overflow vulnerabilities could enable an attacker to circumvent Windows security and gain administrative ...

Browser Alternatives Are No Guarantee of Security

Saturday, March 8th, 2008

If you use an alternative browser--Firefox, Opera, Mozilla, or anything not named Internet Explorer--you may be feeling pretty smug these days. Every time you hear about another patch for IE or about another way hackers use that browser to attack unsuspecting Web users, you think to yourself, "I don't have ...

Securing Wi-Fi Networks Doesn’t Have To Be Painful

Saturday, March 8th, 2008

Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...