Beware Facebook Photo Tag Announcements–They Could Be Malware

Malware is spreading on the Facebook platform posing as emails from Facebook saying you have been tagged in a photo.  Clicking on the link will redirect you to a malware download site, and then almost immediately to Facebook, so you may not even know that this has happened.  Please be careful opening these emails.  It is usually a better course of action to simply go to your Facebook page and search for the photo tag there.  Of course, in this ...

Continue Reading →
0

Happy System Administrator’s Day

Today is System Administrator’s Day.  Yes, this is official.  Today is a day to remember those shy, quiet,  and largely unseen gnomes who run your computer world.  I am one of those guys.

So send your favorite computer buddy (you know the one who you call when you get that goofy error message) a little shout out by email, text, or Facebook.  Trust me, they will appreciate it.

Continue Reading →
0

Ten Security Techniques You Can Use

From ITWorld.  Here are some security techniques you can use that, in spite of how goofy they may sound, actually do provide an increased security profile.

  1. Renaming administrative accounts.  While this is often recommended, it is seldom done.  Please be aware that in the history of automated malware exploits,  they have always gone after the built-in administrative account names.  By changing them, you defeat the authors with a simple name change, plus it is easier to monitor login attempts ...
Continue Reading →
0

Microsoft Warns of Security Flaw in Gadgets

Microsoft has issued a security warning to users of the Gadget sidebar in Windows Vista and Gadgets in Windows 7.  Gadgets are the little applets like a clock, news headline feed, or weather feed that can be added to the desktop area.  Apparently a method has been developed to allow for the creation of custom gadgets, that when added to their computer system by users, would allow the providers of the gadget remote access and control of the computer, and ...

Continue Reading →
0

Illegal BitTorrent Porn Downloaders Extorted by Porn Industry

People who have been using BitTorrent to “share” pornographic videos online are finding themselves being sued by the porn production companies, a la the RIAA, but with a twist.  While the recording industry has spent a small fortune suing grandmas, parents of small children, people without computers, and other individuals for sharing and downloading songs illegally, the pornography industry is simply trying to monetize the process.  In letters sent out to suspected downloaders of porn, the industry threatens the cost ...

Continue Reading →
0

Microsoft Warns of Security Flaw in Gadgets

Microsoft has issued a security warning to users of the Gadget sidebar in Windows Vista and Gadgets in Windows 7.  Gadgets are the little applets like a clock, news headline feed, or weather feed that can be added to the desktop area.  Apparently a method has been developed to allow for the creation of custom gadgets, that when added to their computer system by users, would allow the providers of the gadget remote access and control of the computer, and ...

Continue Reading →
0

Windows 7 Surpasses Windows XP–Finally!

It has been nearly 3 years since Windows 7 was launched, and it has finally surpassed the 11 year old and somewhat long in the tooth Windows XP in percentage of Windows computers in use.  Windows 7 has a 42% share with windows XP falling to 41% as users replace their older systems.  Windows Vista, never very popular with users, has a 7% share, down from its highest share of 13%.  It is expected that Windows 7 with achieve 48% ...

Continue Reading →
0

Impressive Multi-Platform Backdoor Trojan Targets Windows, Linux and Apple Computers

The bad guys just keep getting better and better, which is why I am going back to school to upgrade my security expertise.  A recent outbreak was discovered by F-Secure and  reported by Sophos, that uses a Java archive file to determine which operating system you are using, and then downloads the appropriate version to malware to install.  The lesson here is that any imagined security invulnerability you thought you had as an Apple or Linux user is ...

Continue Reading →
0

Impressive Multi-Platform Backdoor Trojan Targets Windows, Linux and Apple Computers

The bad guys just keep getting better and better, which is why I am going back to school to upgrade my security expertise.  A recent outbreak was discovered by F-Secure and  reported by Sophos, that uses a Java archive file to determine which operating system you are using, and then downloads the appropriate version to malware to install.  The lesson here is that any imagined security invulnerability you thought you had as a Windows or Linux user is ...

Continue Reading →
0

Meeting Request is Malware-Laden Spam

Be on guard against email messages that look like a meeting announcement.  The attachment, Report.zip,  is a Trojan horse.  In many cases there are what appear to be intentional typos in the body text, partly to defeat spam filters and partly to appear as a hastily written email.  You will want to treat these kinds of email with suspicion.  When in doubt, suspicious attachment and links can be sent to Virus Total for analysis.  Thanks again to Continue Reading →

0
Page 235 of 261 «...210220230233234235236237...»