Phishers Bite Back with Malware Exploits Linked to Keywords

Tuesday, August 26th, 2008

Criticize the people behind the Asprox botnet, and they take it personal—so much so that they will bombard you with malware, according to a report by SecureWorks. The botnet, now at least 50,000-strong with bots, is sending out phishing e-mails posing as messages from banks in the United States and United ...

Ten ways improve Vista’s security

Wednesday, August 20th, 2008

Although Windows XP was Microsoft's preferred desktop operating system for an unprecedented length of time, it became something of a PR nightmare for the software giant. Windows XP is full of security holes and is very easy to compromise. When Microsoft created Windows Vista, its primary goal was to address ...

More Ways to Protect Yourself From Phishing

Wednesday, August 6th, 2008

In my recent Editors' Notes post on Consumer Reports' recommendation that Mac users dump Safari because the Apple browser lacks the anti-phishing tools of Firefox and Opera, I focused on behavioral changes one can make that minimize the risks of phishing attempts. I didn't, however, discuss a relatively simple configuration ...

iPhone vulnerable to phishing attacks

Wednesday, July 23rd, 2008

Security researcher Aviv Raff said on Wednesday that the iPhone's Mail and Safari applications are prone to URL spoofing and could allow phishing attacks against iPhone users.The alert was anticipated. Prior to the release of the iPhone on July 11, Raff was one of a few security researchers who indicated ...

Phishers Lose the URLs

Tuesday, July 22nd, 2008

Phishers are doing their homework. The conventional way is to ask users to update their accounts by asking them to click a certain link. A phishing email usually displays legitimate URL or a hyperlink. Upon clicking, the user will be redirected to the phishing Web site. But now, there’s no URL ...