Search Results for "cyber war"


  • Trojan Horse Writer Chats With AVG As They Investigate His Code
    This story is interesting because it shows just how powerful a Trojan Horse program can be.  Trojans make up over two-thirds of all malware infections, and the reason is that Trojan Horse programs are small, easy to conceal in another program like a game, or easy to install using a drive-by dow...
  • Whimsical Chrome Error Message
    Ah…those daffy folks at the Googleplex really know how to keep my life interesting.  One of my clients was trying to install Carbonite, the online backup product, and got an error message saying that the download might be potentially dangerous, which is not all that unusual.   It so...
  • Inside a Credit Card Number Theft Operation
    Have you ever wondered what happens to credit card information that is stolen online?  Sure the card numbers get resold on cyber-crime web sites and discussion boards, but a recent FBI sting operation has resulting in the arrest of 24 “carders” from the US and elsewhere, and provides a deta...
  • Did the CIA Infiltrate Microsoft to Deploy Stuxnet, Duqu, and Flame?
    There is buzz on the Internet that the three very successful cyber-war programs that the US and Israel launched against the Iranian Nuclear (Power?  Weapons?)Program, had be distributed, at least in part, by masquerading as a standard Windows Update.  For this to work, it makes sense that ...
  • Fake Facebook Emails Send You to Viagraville
    Spammers are driving traffic to a Canadian pharmacy website for Viagra and Cialis prescriptions using realistic looking Facebook notifications emails.  Here is an example: This example is from the Sophos blog.  The basic play hear is for the spammers to earn money from your click-through ...
  • Peer to Peer File Sharing–Don’t Do It!
    Another story from a computer user, courtesy of Tech Support Guy. “One of our teens had, unknown to us, not just one but four of those under her login on her dad’s computer. She knew it was illegal but, like her friends, did it anyway. One downloaded file carried a Trojan that turned off th...
  • Phone Phishing Scam by Ammyy.com
    Usually I get my “phishing” done via email.  This one used the good old telephone!!  I just got a phone call from “Mark,” who was obviously from India.  He called to inform me that I probably had downloaded some viruses and would I “please to like help” removing them? I w...
  • How Fast Can Your Password Be Cracked?
    When I teach my computer security class, I show an example of how much difference using a longer or more complex password can make in terms of total number of attempts required to break a password using automated brute force methods that simply try all possible combinations against a password. ...
  • Securing Your Wireless Network
    For people running home or small business wireless networks there are a few tips that can help you run your wireless access point more securely. Don’t let everyone use your network.  A wireless access point will work out of the box, just power it up and plug it into your DSL or cable modem.&...
Page 147 of 148 «...120130140144145146147148