Every layer of protection you add will harden the target against cybercrime. SmartScreen technology found in Internet Explorer 8 has recently clocked...
Mario Vuksan, Tomislav Pericin and Brian Karney have been talking...about vulnerabilities they've found in various compression formats ... as well as their...
September 2009 saw some key security analysis raining directly onto the Adobe PDF platform, particularly with SANS pointing towards remote code execution...
[Interim updates removed: later information on Twitter profile attacks and Blackhat SEO attacks using keywords related to this topic to spread malware,...
Looking into their crystal balls (no jokes, please) at the end of 2009, our colleagues in Latin America came up with a...
[Update: so far I have two votes for dumb. Maybe I'm giving this spammer too much credit, and it is a simple...
Specifically spear-phishing, where the target is deliberately selected, as opposed to a random untargeted attack. An article at Dark Reading.com discusses the...
I feel like the learned judge in the ’60s who asked, in the course of a trial, “What is a Beatle?” since...
Regular readers will be aware that, unlike many people in the security industry, people in this research team tend to be enthusiastic...
There’s been a certain amount of buzz in the past couple of days about messages claiming to link to Wire Transfer information,...
When I first went to university at the end of the 1960s (yes, I really am that old, though not quite old...
I’ve mentioned here before that targeted malware, often delivered by “spear phishing” carried by apparently “harmless” documents such as PDFs, .DOCs and...
Someone raised an interesting point in a comment to yesterday’s blog about Symantec’s own PIFTS.EXE being flagged by their own firewall as...
…no promise of chicks for free, but I did get spam this morning offering me a “Free-Trial kit” for some scheme for...
Don’t expect antivirus alone to protect you from everything. Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but...
I promised you some more thoughts on the AVAR conference. Randy Abrams and I put together a paper on user education for...
Perhaps the most impersonated person in the world is Santa Claus. For Santa, Identity theft isn’t a problem, but for millions of...
An article on internetnews.com today caught my eye. “In Search of Smarter Phones” http://www.internetnews.com/bus-news/article.php/3788456 tells of capabilities being added to smart phones and...
When I get a chain letter like this, I don't usually respond to everyone else who received it, even when it's a...
The election may be over, but the bad guys are still milking it, and there are lessons to be learned. I guess...
In "Viruses Revealed", Robert Slade and I said that ""In many ways, the Internet Worm is the story of data security in...