They’re evil; they’re nasty; we hate them; and we’re still pissed at Sony for bringing them into the limelight. Rootkits. Ugly bits of malware code that dig deep into your OS kernel, there to hide and do their nefarious business beneath the radar of your average AV program. Sony’s ill-thought out rootkit served to ‘protect’ […]
By Matt Pearson Contributing Writer, [GAS] A lovely new zero-day vulnerability in Microsoft Windows has hit the public scene. At the end of March, exploitation of a previously (publicly) unknown vulnerability in Windows’ animated cursor (ANI) processing was detected in the wild. This new vulnerability is now being widely exploited to install Trojan malware into […]
–How to Understand More of What you Read Do you want to understand more of what you read, even when the material seems to be too complex for you? No problem! Just follow Ann McNeal’s four-step guide for reading a research paper. –Office Ergonomics – Make Your Work Hours at the Computer More Comfortable A […]
Tim Wilson, Site Editor for DarkReading.com, has just posted a simple, no-nonsense article explaining how to develop an effective computer security intrusion response policy. A must read for all of you who are managing a network with no security policies in place. Well, it’s finally happened. Despite all your efforts to stop both internal and external […]
The Mozilla Foundation has announced yesterday that starting April 24th, they would stop supporting all versions of Firefox prior to version 2.0. Still running on version 1.5? Hurry up and upgrade before it’s too late! Here’s a link to the latest version of Firefox bundled with the Google toolbar.
Talk about a bad day at the office: a computer technician working for the Alaskan government accidentally wipes out nine months’ worth of critical data, only to find later that his backup plan isn’t working. Ouch! If you’ve used a computer for long, you’ve experienced the chilling moment when you realize you’ve mistakenly deleted something […]
Right after the months of Apple, PHP and browsers bugs, 2 “security researchers” have decided to follow the “Month of Bugs” trend and make April a month of daily MySpace vulnerability disclosures. According to the duo, the main goal of this new effort is not really about making MySpace more secure but more about showing […]
You’ve heard of rootkits (the stealthy tools that help attackers hide their activity on your computer), but do you know the difference between user mode rootkits and kernel mode rootkits? And how do you detect and defend against them? If not, then enlight yourself by watching this interesting video from the security Pros at Watchguard. […]