Saturday, March 8th, 2008
The spyware threat to enterprise security will increase over the next few years without an enterprise-class tool to prevent it, consulting firm META Group warns.
Spyware has both good and bad properties that make it difficult for traditional antivirus software to identify and clean up, leaving only a handful of consumer ...
Posted in Security | No Comments
Saturday, March 8th, 2008
The Internet Storm Center has announced a very scary discovery. They have found a browser hijacker, installed as a Browser Helper Object (BHO), that will monitor what are supposed to be secure, encrypted browsing sessions and steal passwords. These passwords then are forwarded to a web based script at www.refestltd.com. ...
Posted in Security | No Comments
Saturday, March 8th, 2008
US CERT (the US Computer Emergency Readiness Team), is advising people to ditch Internet Explorer and use a different browser after the latest security vulnerability in the software was exposed.
A statement on the CERT site said: "There are a number of significant vulnerabilities in technologies relating to the IE domain/zone ...
Posted in Security | No Comments
Saturday, March 8th, 2008
According to unconfirmed reports, including a recent thread on the BugTraq mailing list, versions of a new Beastie Boys CD from Capitol Records ('To the Five Boroughs'), which is being distributed worldwide except in the USA and UK, contain what could be labeled as a computer virus. Based on these ...
Posted in Security | No Comments
Saturday, March 8th, 2008
Four-fifths of spam now emanates from computers contaminated with Trojan horse infections, according to a study by network management firm Sandvine out this week. Trojans and worms with backdoor components such as Migmaf and SoBig have turned infected Windows PCs into drones in vast networks of compromised zombie PCs.
Sandvine reckons ...
Posted in Internet, Privacy, Security | No Comments