Spyware and adware rogues’ gallery

Saturday, March 8th, 2008

The ranks of spyware and adware expand daily, but some take root more often than others. Here are six of the usual suspects. These spyware and adware mischief-makers have taken root on more than their share of hard disks. Symptoms include performance and compatibility problems, not to mention continuous pop-up invasions. 1: ...

Scanner Tool Released To Thwart JPEG Attack

Saturday, March 8th, 2008

With security experts predicting a large-scale worm attack is only a matter of days away, Microsoft has released a scanning tool to help users identify vulnerable versions of the GDI libraries that handle JPEG processing. The Microsoft GDI+ Detection Tool (available for download here) helps detect the presence of non-Windows Microsoft ...

Click here to become infected

Saturday, March 8th, 2008

Users should be wary of pressing the 'click here to remove' link on spam messages because it serves to confirm to spammers that junk mail messages are being read. Such email addresses can be sold at a premium to other spammers. That's reason enough to simply delete spam messages, but a ...

More big security holes in Linux

Saturday, March 8th, 2008

Open-source developers have warned of serious security holes in two Linux components that could allow attackers to take over a system by tricking a user into viewing a specially crafted image file or opening an archive. Patches exist for the bugs, which affect LHA and imlib. Imlib, a library for graphics-viewing ...

What You Should Know About Firewalls

Saturday, March 8th, 2008

Scott Rolf knows trouble when he sees it. An IT director for a law firm near Cleveland, Ohio, Rolf was asked by a friend to check out the new Web site the friend had put up on a DSL-connected Web server. Rolf did more than just visit his friend's site; ...