The technique, which could undermine security software protecting critical data on computers, is as easy as chilling a computer memory chip with a blast of frigid air from a can of dust remover. Encryption software is widely used by companies and government agencies, notably in portable computers t
Virus and Threat Info
Posted by selvi
Posted on 8:23 PM
with No comments
I-Worm/NuwarNew Nuwar variant spreading method is similar to Nuwar.L last month propagation. Spammed emails are brief containing link in IP format to currently working pages with worm. Compromised page code is changed and as a result user is prompted to download file with worm. Downloaded filename
How can I recognize a phishing email?
Posted by selvi
Posted on 11:47 PM
with No comments

You should consider several factors when deciding whether or not an email is authentic. This example email has some telltale signs of a phisher at work:Unofficial "From" address: Look out for a sender's email address that is similar to, but not the same as, a company's official email address. Fraud
Security Warning 2008: Top 11 Malware
Posted by selvi
Posted on 11:22 PM
with No comments
Liewareif(window.yzq_d==null)window.yzq_d=new Object(); window.yzq_d['tPKWvNGDJGM-']='&U=13b4jmo60%2fN%3dtPKWvNGDJGM-%2fC%3d636491.12037792.12607856.2498248%2fD%3dLREC%2fB%3d5211005'; In 2007, there was a lot of "rogue anti-virus software," wh
Red Hat, Ubuntu Win Linux Popularity Open Source
Posted by selvi
Posted on 11:17 PM
with No comments
Ubuntu and Red Hat are the most used Linux distributions among the 35,000 members of content-management vendor Alfresco's community, the company found in its second survey of trends in enterprise open-source software usage. m