Saturday, March 8th, 2008
The ranks of spyware and adware expand daily, but some take root more often than others. Here are six of the usual suspects.
These spyware and adware mischief-makers have taken root on more than their share of hard disks. Symptoms include performance and compatibility problems, not to mention continuous pop-up invasions.
1: ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
With security experts predicting a large-scale worm attack is only a matter of days away, Microsoft has released a scanning tool to help users identify vulnerable versions of the GDI libraries that handle JPEG processing.
The Microsoft GDI+ Detection Tool (available for download here) helps detect the presence of non-Windows Microsoft ...
Posted in Security, Software, Windows | No Comments
Saturday, March 8th, 2008
Users should be wary of pressing the 'click here to remove' link on spam messages because it serves to confirm to spammers that junk mail messages are being read. Such email addresses can be sold at a premium to other spammers.
That's reason enough to simply delete spam messages, but a ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Open-source developers have warned of serious security holes in two Linux components that could allow attackers to take over a system by tricking a user into viewing a specially crafted image file or opening an archive. Patches exist for the bugs, which affect LHA and imlib.
Imlib, a library for graphics-viewing ...
Posted in Linux, Security | No Comments
Saturday, March 8th, 2008
Scott Rolf knows trouble when he sees it. An IT director for a law firm near Cleveland, Ohio, Rolf was asked by a friend to check out the new Web site the friend had put up on a DSL-connected Web server. Rolf did more than just visit his friend's site; ...
Posted in Hardware, Internet, Security | No Comments