Describing Malware

Tuesday, December 23rd, 2008

This picture just about sums it up: Picture Source: http://www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threat-report-jan-2009-na.pdf

Make Firefox Alert You When You Send Information Unencrypted

Tuesday, December 23rd, 2008

Here's a quick little tip for users that might not know enough about internet security and privacy to stop and look for SSL/TLS (https://) when submitting forms on the web.  Or maybe the form page itself is on an unencrypted page, but the data actually gets sent encrypted when the ...

Microsoft confirms critical SQL Server vulnerability

Monday, December 22nd, 2008

Microsoft late Monday issued a pre-patch advisory confirming a remote code execution vulnerability affecting its SQL Server line. The vulnerability, publicly disclosed with exploit code more than two weeks ago, affects Microsoft SQL Server 2000, Microsoft SQL Server 2005, Microsoft SQL Server 2005 Express Edition, Microsoft SQL Server 2000 Desktop Engine ...

DNSChanger 2.0

Sunday, December 21st, 2008

DNS Changer 2.0 (Trojan.Flush.M) is the next –in the wild- variant of this famous malware. Now the strategy has been changed, no need to modify the DNS settings on ADSL routers. Instead it will install a network driver (NDISProt.sys) which allows the malware to send/receive raw Ethernet packets. Such approach ...

Lock Down Your Data

Saturday, December 20th, 2008

This is a great list of various things you can do to protect your data.  Here's a quick summary: 10. Wipe that iPhone (or BlackBerry) before trading in. 9. Use virtual credit cards for iffy online buys. 8. Hide data inside files with steganography. 7. Plan for the worst. 6. Get smarter on security questions. 5. ...