Archive | Security

RSS feed for this section

Is Online Backup Secure?

The principles behind online backup and cloud storage services are quite simple. In most cases, in order to keep accurate and current copies of your information, a backup service will most likely provide you with a piece of software to install on your computer.

Read full story · Comments { 0 }

Using A Public Hotspot? You Really Should Use A VPN

Without a personal VPN, hackers and data sniffers can tap into your connection on an unsecured public Wi-Fi Hotspot.

Read full story · Comments { 0 }

Potential Malware Threats Hit Chrome

Most of you are not surprised to hear that malware attacks can hit any browser, Internet Explorer is not necessarily weaker than other browsers in the security camp, they just […]

Read full story · Comments { 487 }

Outsourced E-Mail Provider Epsilon – Hacked

Recent events in the area of Internet security have shown that big players can make a difference and shut down hackers or hacking sites. But on the other hand, hackers […]

Read full story · Comments { 76 }

The Rustock Takedown Spam Down 33%

The Rustock Botnet was taken down earlier this month. It had accounted for billions of spam e-mails daily.  According to Symantec’s March 2011 MessageLabs Intelligence Report this is a big accomplishment […]

Read full story · Comments { 20 }

Text Messages Of Death Threaten The 5 Billion Users

It’s fairly well known at this stage that high end smartphones like the iPhone, Android and Windows Mobile devices can all be hacked and have been, but surprisingly only 16% of all […]

Read full story · Comments { 1 }

Some Results from the ToorCon Security Conference

Harckers, security researchers at the ToorCon security conference in San Diego showed how easy it can be to poke holes in hardware and software with the right combination of tools, […]

Read full story · Comments { 106 }

Dangerous Websites Part 2

Sites like Facebook give rise to new forms of phishing. For example, scammers might hijack a Facebook account, then use it to lure that person’s friends into clicking a friendly link but is not and going to spam sites, or even giving up their Facebook login information.

Read full story · Comments { 35 }

Dangerous Websites – Part 1

Making calls can alert others about where you are. Because many mobile phones now carry Apps, they can be subjects of malware, or spyware, getting information about you. Watch what you say, and what you download.

Read full story · Comments { 0 }

Microsoft To Ship ASP Security Patch

An attacker can decrypt cookies, view states, form authentication tickets, identify membership passwords, see user data, and anything else encrypted using the ASP.NET framework’s API. These issues are significant because the vulnerabilities exploited affect the .NET framework, which is used by 25 percent of Web sites on the Internet.

Read full story · Comments { 39 }

Virus Bulletin Results for August

The WildList is used as the basis for in-the-wild virus testing and certification of anti-virus products by several working groups like ICSA, Secure Computing, and Virus Bulletin.

Read full story · Comments { 16 }

Two tools to help with secure passwords

Choosing a secure password to use online is second only in difficulty to knowing if that password is really secure or not.  I thought I’d share with you two tools […]

Read full story · Comments { 2 }