Saturday, March 8th, 2008
Hackers will keep cranking out exploits that take advantage of known software vulnerabilities because, although patches are available, a minority of machines are fixed, security vendor McAfee said Monday. In releasing its quarterly security analysis, McAfee's "AVERT" virus research team noted that exploited vulnerabilities are becoming a dominant threat to ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Everyone likes to be a good host, but bad guests get carried away. They?ll stay too late or empty bottles too soon. They could even break something along the way. That?s why you take precautions as a host.
Think of your Windows HOSTS file in the same way. By properly setting ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
Hacker tools are growing more sophisticated and automated. Hackers can now quickly adapt to new security vulnerabilities as they are uncovered and distribute the fruits of their exploits more widely with the help of automated toolkits. And they're employing an ever-increasing range of methods to find individuals' and companies' private ...
Posted in Networking, Security | No Comments
Saturday, March 8th, 2008
Wireless LANs utilize radio waves for transporting information, which results in security vulnerabilities that justifiably worry network managers. To assuage those worries, most companies implement authentication and encryption to harden security. However, WLANs have a whole host of other vulnerabilities that can be more difficult to completely smother such as ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
A new website has been built to educate British online consumers about the dangers of phishing scams.
The Phishing IQ Test has been set up with faux emails from banks and e-commerce vendors, and users are invited to judge whether they are legitimate or not.
A results page reveals the correct answers ...
Posted in Internet, Privacy, Security | No Comments