Straight From PandaLabs – Malware to Watch for in 2010
Button up your overcoat and get your rain gear ready; it’s going to get stormy! PandaLabs has released its 2010 forecast of computer threat trends for 2010. Cybercriminals are increasingly more...
View ArticleGmail Service Center and PayPal Spam Scams Are Back!
The old “Due to the congestion in all Gmail users and removal of all unused Gmail Accounts” scam, is making a reappearance. This scam has been around for years, and every so often it makes its way...
View ArticleUSBThief – Making it Easy for Cyber Criminal Wannabes
With access to your passwords, cyber-criminals (they come in all shapes, sizes and flavors – so don’t be fooled), can and will, steal your identity and without a doubt severely compromise your...
View ArticleYour Car is a Connected Device and Ford’s Security Hits the Road
I live in a connected world. I’m connected by an umbilical cord of technology to the wider world (outside of my immediate social circle), by landline, smart phone, laptop, and desktop. Cyber criminals...
View ArticleNightmare Scareware – Be Prepared
Scareware, otherwise known as “rogue security software”, is the stuff of nightmares. Scareware is a particularly vicious form of malware, designed specifically to convince the victim to pay for the...
View ArticleSay “Yes” on the Internet and Malware’s Gotcha!
Virtually every computer user, at both the home user level (my friends), and at the corporate level, whom I come into contact with, tends to downplay personal responsibility for a malware infection. I...
View ArticleShould You Forget About Password Safes and Write Down Your Passwords?
There are days when Surfing the Internet, it seems to me, is like skating on thin ice – one wrong move and you’re in trouble. I know – this past weekend I got hacked. After 20+ years – BAM! There …...
View ArticleIf Your Bank Doesn’t Know Your Name – Maybe That’s A Clue The Email Is Fraud...
I can’t imagine receiving an email from my bank that didn’t include my name and other pertinent personal details. After all, how difficult would it be for my bank to personally address an email to me,...
View ArticleI’ve Got 10 Kilos Of GOLD I Want To Share With You!
My Australian friend Rod, a security developer executive, regularly forwards copies of scam emails that his company detects, through their various Internet resources. I’m very appreciative that Rod...
View ArticleCloud Computing: Easy Target for Cyber Criminals?
Guest writer Paul E. Lubic, Jr., has some definite ideas on the US government’s decision to employ Google’s cloud based computing model. Paul explains why, in his view, this risky venture will play...
View ArticleMalware Attacks – How Much Disclosure Are You Entitled To?
I’m an advocate of full disclosure. I demand transparency (not always successfully), in every area that has the potential to impact my life at any level. Period. Since cyber crime has the potential to...
View ArticleDepending On Your Antimalware Applications For Internet Security? An...
Let me begin this article by defining the word “responsibility”, a concept which appears to me, to be losing its place in modern culture. Definition – a duty or obligation to satisfactorily perform or...
View ArticleTwitter, Tweets, Cyber-Criminals And You
I like the idea that technology makes it easier to stay “connected”, but Facebook , Twitter and the like, take that connected feeling well past my comfort zone. While I do have several Twitter...
View ArticleBitDefender Study – Your Facebook and Twitter Link Clicking Habits Suck!
Earlier this month, I wrote an article Twitter, Tweets, Cyber-Criminals And You, in which I set out the potential security pitfalls associated with Facebook and Twitter, and described the type of wonky...
View ArticleWeak Password Control – A Self Inflicted Injury
Over the weekend, Gawker.com was attacked, leading to a compromise of some 1.5 million user login credentials on Gawker owned sites, including Gizmodo, and Lifehacker. According to Gawker Media – Our...
View ArticleMarch 2011 MessageLabs Intelligence Report – Rustock Goes Down, Bagle Botnet...
There’s been much more discussion recently as to whether infected computers should be allowed unrestricted access to the Internet. Despite the fact we’ve been around the horn on this question for...
View ArticleKate Middleton Nude – As If!
I’m an easy mark when it comes to pomp and circumstance, so like millions worldwide, I just finished watching the Royal Wedding. An impressive occasion, to say the least. Now, I need to relax and get...
View ArticleScareware Is Everywhere – As Mac Users Just Found Out
The success cyber criminals have had with the recent Mac scareware attack (MacDefender, which has already morphed into a new variant – MacGuard), emphasizes the following point – given the opportunity,...
View ArticleBitDefender Safego – A Free Social Network Cyber Criminal Defense System
No matter my own thoughts on Facebook and Twitter (which are not entirely positive), it’s impossible to ignore the impact social networking has had on how we communicate. It’s hardly surprising then,...
View ArticlePut BitDefender Safego Between You And Facebook, Twitter Scammers
It’s an awesome summer day here, and the sum-sum-summer time lazies have gotten a stranglehold on my motivation to stay connected. Since it won’t be all that long until it’s back to snowstorms and...
View Article
More Pages to Explore .....