Saturday, March 8th, 2008
I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...
Posted in Hardware, Internet, Privacy, Security | 1 Comment
Saturday, March 8th, 2008
Unfortunately, ActiveX controls are ideal tools for those who would attack your computer. Over the years, Internet Explorer has been their favored vehicle. It was built to take advantage of ActiveX controls.
These controls pose a serious security threat that outweighs their benefits. So it's important to take steps to protect ...
Posted in Internet, Security, Windows | No Comments
Saturday, March 8th, 2008
Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device, according to an executive from SPI Dynamics, which discovered the security hole. The buffer-overflow vulnerabilities could enable an attacker to circumvent Windows security and gain administrative ...
Posted in Security, Windows | No Comments
Saturday, March 8th, 2008
If you use an alternative browser--Firefox, Opera, Mozilla, or anything not named Internet Explorer--you may be feeling pretty smug these days. Every time you hear about another patch for IE or about another way hackers use that browser to attack unsuspecting Web users, you think to yourself, "I don't have ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments