Hackers Increasingly Target Browsers

Saturday, April 12th, 2008

Threats against browsers are getting more sophisticated and branching out into such exotic areas as gaming, experts told attendees at the recent RSA Conference 2008. New attacks from games and virtual-world Web sites can deliver bot-like control of browsers to attackers, said Ed Skoudis, a security consultant with Intelguardians, speaking at ...

Turn Off or Disable User Account Control (UAC) in Windows Vista

Saturday, April 12th, 2008

User Account Control (UAC) is a new security feature in Windows Vista that requires all users to log on and run in standard user privileges mode instead of as administrator with full administrative rights, thus prevent unauthorized or accidental changes that could destabilize the computers or allows virus and malware ...

Tuning The Windows Vista Firewall

Saturday, April 12th, 2008

At first glance, the Windows Vista firewall is disappointing to say the least. On the surface, it looks like a Windows XP leftover. In fact, the firewall's user interface in Windows Vista is nearly identical to the interface found in Windows XP. There aren't even any new configuration options available. The ...

Security Guru Gives Hackers a Taste of Their Own Medicine

Friday, April 11th, 2008

Malicious hackers beware: Computer security expert Joel Eriksson might already own your box. Eriksson, a researcher at the Swedish security firm Bitsec, uses reverse-engineering tools to find remotely exploitable security holes in hacking software. In particular, he targets the client-side applications intruders use to control Trojan horses from afar, finding vulnerabilities ...

Malware filters bad for business

Friday, April 11th, 2008

Up to 80% of Web sites flagged as malicious by antivirus and search engine indexes are legitimate businesses, according to security experts. Experts said while the security industry is on top of conventional spam and phishing attacks, more effort needs to be put into preventing and eliminating so-called drive-by-downloads. The attacks allow ...