SANS Top 20 Internet Security Vulnerabilities

Saturday, March 8th, 2008

The vast majority of worms and other successful cyber attacks are made possible by vulnerabilities in a small number of common operating system services. Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools. They ...

Click here to become infected (Part 2)

Saturday, March 8th, 2008

New spam emails can turn vulnerable PCs into spam-spreading 'zombies'. The spam has a link which purports to allow users to opt out of future emails. However, MessageLabs, an e-mail filtering company, warns that these links are part of a scam and, if clicked on, will turn a victim's PC into ...

Click here to become infected

Saturday, March 8th, 2008

Users should be wary of pressing the 'click here to remove' link on spam messages because it serves to confirm to spammers that junk mail messages are being read. Such email addresses can be sold at a premium to other spammers. That's reason enough to simply delete spam messages, but a ...

What You Should Know About Firewalls

Saturday, March 8th, 2008

Scott Rolf knows trouble when he sees it. An IT director for a law firm near Cleveland, Ohio, Rolf was asked by a friend to check out the new Web site the friend had put up on a DSL-connected Web server. Rolf did more than just visit his friend's site; ...

E-mail viruses getting smarter

Saturday, March 8th, 2008

Computer viruses spread by e-mail are growing more sophisticated as virus writers and spammers are thought to be joining forces in an effort to make smarter bugs, a computer security group said Tuesday. New York-based MessageLabs, which scans client e-mails for viruses to block, said it picked apart some ...