A Method for Critical Data Theft

A Method for Critical Data Theft
The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers t

Virus and Threat Info

Virus and Threat Info
I-Worm/NuwarNew Nuwar variant spreading method is similar to Nuwar.L last month propagation. Spammed emails are brief containing link in IP format to currently working pages with worm. Compromised page code is changed and as a result user is prompted to download file with worm. Downloaded filename

How can I recognize a phishing email?

How can I recognize a phishing email?
You should consider several factors when deciding whether or not an email is authentic. This example email has some telltale signs of a phisher at work:Unofficial "From" address: Look out for a sender's email address that is similar to, but not the same as, a company's official email address. Fraud

Security Warning 2008: Top 11 Malware

Security Warning 2008: Top 11 Malware
Liewareif(window.yzq_d==null)window.yzq_d=new Object(); window.yzq_d['tPKWvNGDJGM-']='&U=13b4jmo60%2fN%3dtPKWvNGDJGM-%2fC%3d636491.12037792.12607856.2498248%2fD%3dLREC%2fB%3d5211005';  In 2007, there was a lot of "rogue anti-virus software," wh

Red Hat, Ubuntu Win Linux Popularity Open Source

Red Hat, Ubuntu Win Linux Popularity Open Source
Ubuntu and Red Hat are the most used Linux distributions among the 35,000 members of content-management vendor Alfresco's community, the company found in its second survey of trends in enterprise open-source software usage. m