Wednesday, March 30, 2005

Bad e-mail habits sustains spam

BBC NEWS | Technology | Bad e-mail habits sustains spam

As if we didn't already know this, here comes another reminder. The best way to eliminate spam is simply to not reply to it. If no one bought anything from spam e-mail, no one would send it out. Who was it who said, we have met the enemy and it is us?

Stolen UC Berkeley laptop exposes personal data of nearly 100,000

Stolen UC Berkeley laptop exposes personal data of nearly 100,000


Another security theft at a major university strengthens the importance of moving away from social security numbers as the means of identifying students. All of this happened with the theft of only one computer. It's difficult enough to protect your own information, it's even more of a problem to ensure that those who you trust to protect your information actually do so.

School is in: 7 computer security tips for students

School is in: 7 computer security tips for students

Microsoft is offering a helpful guide especially for students, but is also applicable to all computer users with advice on protecting your computer from various types of malware and other security problems.

Tuesday, March 29, 2005

Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites

Spyware Warrior: Rogue/Suspect Anti-Spyware Products & Web Sites

This is a good list of spyware/adware software that should be avoided because it fails to fulfill promises or because better removal programs are available. Spyware S&D, Adaware SE Personal and Microsoft's anti-spyware program are all excellent and free ways to protect and clean your computer.

Security no match for theater lovers

Security no match for theater lovers

Another example of people who are willing to give out enough information for someone to establish a credit card in their name for the sake of free movie tickets. Be careful of someone offering anything for the sake of a few bits of personal information. Always wonder if there is some way that information might be used against you.

Passwords revealed by sweet deal

BBC NEWS | Technology | Passwords revealed by sweet deal

Passwords can be the key to protecting your personal information and preventing identity theft, that's why it is a bit disinheartening that some people are so ready to give up personal information to complete strangers. This is why it is better to use a strong password that is not a pet's/child's name or something about you that could be easily discovered by someone seeking to take advantage of you.

Paranoia: The Best Defense Against E-Mail Attacks

PCWorld.com - Internet Tips: Paranoia: The Best Defense Against E-Mail Attacks

PC World is offering good advice on protecting yourself from phishing attacks by being very careful with your e-mail. A teacher once told me that just because you're paranoid doesn't mean that they aren't out to get you. Since criminals are out to get you, it's always better to error on the secure side.

Monday, March 28, 2005

Site of the Week - Podcast Alley

PodcastAlley.com -- Podcast Directory : The place to find Podcasts

Podcasts are audio broadcasts that you can download and list to off of your MP3 player or IPod. Podcast Alley helps you to find audio shows that might interest you so that you can download them and listen to them later. Podcasting is really helping to democratize the audio airwaves.

Saturday, March 26, 2005

Program of the Week - SyncBack

2BrightSparks.com | Software | SyncBack

Everyone should back up their files often so that if something bad should happen to their computer, they can easily recover them. SyncBack is a free and easy way of backing up your important computer documents onto either the same drive or another. Don't wait until the worst happens before you protect yourself.

Friday, March 25, 2005

Top Spyware Scanners

Top Spyware Scanners

If you are looking for good programs to remove spyware from your computer, here's a list of the top five - several of which are free. You should be sure to have at least one anti-spyware program on your computer, keep it regularly updated and scan your computer at least once a week. I usually scan after each new update.

Two Internet Worms Target MSN Instant Messenger Users

Two Internet Worms Target MSN Instant Messenger Users - Reported by Aunty Spam's Net Patrol

It is the day for Instant Messenger problems. MSN messenger is being targeted by two worms seeking to infect computers. To be infected you have to download a file from the message, so avoid all suspicious attachments. Click on the link for more details.

YahoMessenger Target of Effective Phishing Scam

Yahoo Messenger Target of Effective Phishing Scam - Reported by Aunty Spam's Net Patrol

Yahoo IM is also being targeted by an IM phishing scam by people trying to link to a fake Yahoo site and reveal personal information. Again, be extremely careful of anything that asks for private information.

Security Flaw Uncovered in Trillian

BetaNews | Security Flaw Uncovered in Trillian

A security flaw has been discovered in the instant message program Trillian. Its Yahoo networking could allow someone to take over your computer. So, either don't use this function or be especially careful when downloading IM attachments. Trillian is working on a fix.

MIT Media Laboratoy: Press Images - Clocky

MIT Media Laboratoy: Press Images - Clocky

Here's a new clock for all those who have trouble getting up. Clocky will hide itself after you push the snooze alarm so that you have to get up to find it. Moreover, it will hide itself in a new place every day. You gotta love it!

Yahoo Back in Court Over Nazi Items

PCWorld.com - Yahoo Back in Court Over Nazi Items

In a case which could impact the future of Internet auctioning, Yahoo is trying to keep a French judgment from being enforced in the US. The French government has ordered Yahoo not to make auctions for Nazi memorabilia available to computer users in France. The problem for Yahoo is that in order to comply it would have to make these items unavailable for all its customers - including those in the United States. Yahoo does not believe that a French court should be able to enforce jursidiction of its ruling in the United States.

Thursday, March 24, 2005

Yahoo Launches Creative Commons Search Beta

Business: NewsFactor Network - E-Commerce - Yahoo Launches Creative Commons Search Beta

Yahoo has a new search allowing easier location of Creative Commons material. CC material is digital content such as pictures, sounds, etc that generally has fewer copyright restrictions and so is easier for people to use in their own works. So, if you are looking for some pictures to spice up a presentation you might try this.

Firefox making inroads to the enterprise

Firefox making inroads to the enterprise | Tech News on ZDNet

This article makes some good arguments for and against shifting browsers to Firefox, it would appear that at present Firefox might be a good deal for the individual or small company, but since some of IE's special functions are not available in Firefox and due to a presently unfixed chache bug it might not be prudent for larger businesses to switch - at least not entirely. The authors of this piece seem to think that what will likely take place is an environment in which IE and Firefox coexist.

Wednesday, March 23, 2005

Mozilla browsers unsafe for 15% of 2004

Net4Nowt :: News Story

This is a bit of a false headline. What the statistics of ScanIT show is that Mozilla browsers spent about 15% of the year affected by an unpatched security flaw. To put this in perspective, Internet Explorer was affected by an unpatched security flaw for 98% of the year. Moreover, Mozilla browsers also had the shortest "exposure period" when a patch for known vulnerabilities were unavailable. So, can anyone explain why you wouldn't want to switch to Mozilla's Firefox?

Yahoo Boosts E-Mail Storage to 1GB

BetaNews | Yahoo Boosts E-Mail Storage to 1GB

Striving to match up with Gmail, Yahoo has expanded the size of its free email storage to 1 GB. Hotmail is still at 250 for free accounts. It will be interesting to see if GMail changes its storage in response. Ah the benefits of competition.

Yahoo Desktop Search Goes Past the PC

PCWorld.com - Yahoo Desktop Search Goes Past the PC

Yahoo has expanded its desktop search program to also allow searches of material on its servers such as instant messenger archives. It faces some stiff competition with other desktop search programs such as Google's Desktop Search and Copernic.

Anti-Spyware Companies Promote Cookie Deletion

Anti-Spyware Companies Promote Cookie Deletion
There is a heated debate over the possible threats that cookies pose on your computer. Most cookies are safe, but concern over possible threats compounded with the tendency of many anti-spyware programs to label cookies as threats mean that computer users are loath to allow cookies onto their system. Many businesses rely on cookies to get information about customer interests but do not use cookies to get personal information and the declining acceptance of cookies means less information for businesses and less ability for them to tailor their web sites to meet customer interests. Still, in the culture of fear that exists right now I think most computer users are going to err on the safe side and delete all cookies.

Spyware: the top 10

Spyware: the top 10

Here's a list of what are ten serious spyware threats to know about and to avoid. While some of them attack in secret, others try to trick you by offering services in exchange for swamping you with unwanted advertisements and popups. Knowledge of a threat can help to protect against it.

Symantec: Hackers Turn Attention to Mozilla Browsers

PCWorld.com - Symantec: Hackers Turn Attention to Mozilla Browsers

One of the main promotional points for Firefox was its greater security as opposed to that of Internet Explorer. That greater security is now being questioned as the number of vulnerabilities of Firefox and its companion browser Mozilla were greater than the number of vulnerabilities affecting Explorer. IE, though, still had a higher proportion of severe vulnerabilities and also took longer to fix them.

I will be curious to see how this ratio compares as Firefox improves and when IE 7 is released at some point in the future.

Secunia - Advisories - Mozilla Thunderbird Drag and Drop Vulnerability

Secunia - Advisories - Mozilla Thunderbird Drag and Drop Vulnerability

Mozilla Thunderbird has a vulnerability which has been fixed with the newest version of the software available on the site website here.

The flaw is not critical, but if you use Thunderbird you should go ahead and update it.

How computers make kids dumb

How computers make kids dumb | The Register

Studies are determining that children with access to computers in the classroom and at home actually do worse on tests involving literacy and mathematical ability. The study concluded that although children now have access to more "facts" than ever before, they are less able to evaluate it and to critically work with it. Computers have become less of a tool to improve education and more of a quick fix to appear more modern.

Monday, March 21, 2005

Internet Explorer 6 and Outlook Express tweak guide

Internet Explorer 6 and Outlook Express tweak guide - TechSpot
If you use IE, there are a variety of steps you can take both to make it more secure as well as to customize it according to your needs. This article shows how to make IE more user friendly for you.

Should IE Stay or Should IE Go?

PCWorld.com - Should IE Stay or Should IE Go?

There has been a lot voiced, at least on this site, about the reasons for switching from IE to Firefox. This article by PC World discusses some of those reasons and also gives some reasons for staying with IE that might help you with making your own decision. While it is directed more at the business user, much of what the article discusses also applies to the private individual.

Sunday, March 20, 2005

Site of the Week - Webopedia

This weeks website - Webopedia is an encyclopedia of Internet and computer terms. It is a very helpful recourse since the computer and tech field is constantly coming up with new and somewhat confusing words and terms to apply to all of the new technology. Plus, it might help you understand some of my posts better!

Saturday, March 19, 2005

Program of the Week - CCleaner

If you are like me, you are constantly finding your recycle bin is getting full and that lots of other unneeded files are accumulating. You may also want to make sure your privacy is protected and what you want deleted indeed gets deleted. That's where CCleaner comes in. CCleaner cleans up diskspace and helps your computer to run faster and more smoothly as well. Recommended highly and it's free!

Friday, March 18, 2005

Hacker Turf War Will Lead To Large E-crime Gangs > March 18, 2005

Internet Week > News > Hacker Turf War Will Lead To Large E-crime Gangs > March 18, 2005
Internet Week is predicting an upcoming war among cyber criminals over which infected machines they will control. This war will involve the use of various computer worms and the territory will be your computer. Isn't the Internet wonderful?

AOL clarifies IM privacy guarantee

AOL clarifies IM privacy guarantee | CNET News.com
AOL has been subject to a good deal of criticism regarding its Instant Messenger privacy guidelines. Not surprisingly, it has backtracked on its original language that required users to give up all privacy rights and now only limits privacy in public spaces.

McAfee Multiple Products LHA File Handling Buffer Overflow

Secunia - Advisories - McAfee Multiple Products LHA File Handling Buffer Overflow

Secunia is warning of a highly critical security risk with many McAfee products including VirusScan. If you use one of these products, please look at the above link to see if you are affected and, if so, immediately download the appropriate patch from the McAfee link offered.

Thursday, March 17, 2005

Crypto-Gram: March 15, 2005

Crypto-Gram: March 15, 2005

This is a very good piece on the recent identity theft cases involving ChoicePoint and LexisNexis. The author makes the point that these cases of massive identity theft take place because companies do not feel financially responsible to protect our personal information. Since they do not, it is up to the state and federal governments make sure that they pay a price if they do not act responsibility.

Spammer Sues Spam Victim, Continues Spamming Him

Spammer Sues Spam Victim, Continues Spamming Him

Now this is just wrong. A spammer is suing one of his victims because the victim felt compelled to go to court in order to stop receiving spam. I certainly hope for the defeat of the spammer and for several other curses that are going through my head right now.

The strange decline of computer worms

The strange decline of computer worms | The Register

It's always good to hear about a decline in computer malware, as long as it doesn't mean that another type is on the increase. But it appears that at least some security measures such as firewalls and keeping Windows updated are haveing positive effects.

High-Tech Crime Stopped | Keyloggers Foiled In Attempted $423 Million Bank Heist

TechWeb | High-Tech Crime Stopped | Keyloggers Foiled In Attempted $423 Million Bank Heist

As this article shows, everyone is threatened by trojans - especially keyloggers that steal passwords and account information. Of course, banks are more likely victims because identity thieves see a greater return for their effort but that also only means that you should ensure that your bank is as protective with your personal information as you are yourself.

Biometrics - The End of Passwords? (security)

Biometrics - The End of Passwords? (security)

Biometrics may be the wave of the future for password protection and security and this brief article does a good job of explaining what this might mean in regards to how you and your computer work together in the future.

Wednesday, March 16, 2005

IP-specific addresses - User Talkback - Alarm over pharming attacks: identity theft made even easier - CNET Reviews

IP-specific addresses - User Talkback - Alarm over pharming attacks: identity theft made even easier - CNET Reviews

CNet offers some good, if difficult, advice on protecting yourself from those who might seek to spoof web addresses in order to get your private information via "pharming" - that is to type the IP address into your browser directly. Every site as an IP address or Internet Protocol address although usually we type in the name of the site instead of the address. The article includes the IP addresses of some popular sites as well as a means of identifying the addresses of other sites.

Tuesday, March 15, 2005

Top Five Online Scams

Yahoo! News - Top Five Online Scams

This is a very good summary and explanation of some of the most significant and threatening scams presently active on the Internet as well as some common sense advice you should take in order to protect yourself. There are lots of people interested in your personal information, it's up to you to protect it.

U.S. May Restrict Sale of Social Security Numbers

Technology News Article | Reuters.com

After the recent theft of personal information from ChoicePoint and LexisNexis, it is looking like new restrictions will be put in place to regulate such companies and protect customer privacy. Certainly this is a necessary step, it is unfortunate that all of the warnings regarding what criminals could do with such information went unheeded.

Study Finds Botnet Attacks Worse Than Expected

PCWorld.com - Study Finds Botnet Attacks Worse Than Expected

Over a million computers are being controlled by people who are not their owners - these "zombie networks" can be used to attack other computers, spread spam and other malicious activity. Unfortunately, there is little right now that one can do other than work to keep their computer from becoming another "zombie" by being constantly vigilant in protecting their computer via firewalls and anti-spyware/virus software.

Monday, March 14, 2005

Does Firefox have a spyware problem?

There is some debate as to whether or not Firefox is a threat to a computer by allowing spyware to infect any IE program on a computer system. If you use Firefox and click on a suspicious link, you could download malicious software. For some, like the author of the link below, that is a problem because they believe that Firefox should protect users from all problems [even chosing to click on dangerous links]

Vitalsecurity.org - We're Calm like a Bomb: Firefox Spyware infects IE?

Others, like the writer of the link below argue that Firefox can't be held responsible for the foolish actions of others - especially if it warns people not to click on these links. I think the issue is whether or not a program causes problems if used as it is intended to be used, not if it causes problems if it is not used as intended.

Epidemic of Firefox Spyware - Spyware Weekly Newsletter

Cell Phone Viruses (Gnewbie Gnook)

Cell Phone Viruses (Gnewbie Gnook)

While a couple of cell phone viruses have entered into the wild, they are nowhere near the security threat of computer viruses - at least right now. Still there are anti-virus programs for cell phones if one is interested. In any case, the best means of protecting your cell phone is the same as protecting your computer - don't download anything suspicious.

AOL: AIM Conversations Are Safe

AOL: AIM Conversations Are Safe

This is for all the America On Line instant messagers out there. There is some dispute as to whether the terms of service for AOL require users to forgo any writes to privacy or copyright to materials posted over AIM. AOL is promising to protect privacy, but it doesn't look to good to me. Users might wish to look at a different instant messager service.

"What's pharming and how is it related to phishing?"

"What's pharming and how is it related to phishing?" from the Ask Dave Taylor! Help Desk

Pharming and Phishing are two terms that refer to different, but similar attempts by criminals to obtain your personal security data. This article offers a good explanation of the two security threats and advice on protecting yourself.

Spyware Is Everywhere

Internet Week > Spyware > Spyware Is Everywhere > June 21, 2004

According to Earthlink and Webroot nearly 1 in 3 computers are infected with Spyware. That is certainly a significant amount. They classify spyware as any software or application put on a machine without the users permission - so this would include anything from Trojans to adware cookies. I also wonder whether Earthlink/Webroot might be inflating the significance to sell more of their own anti-spyware software. Still, it emphasizes the need to be alert.

Saturday, March 12, 2005

FTC Takes Down Fraudulent Anti-Spyware Company

Today @ PC World - FTC Takes Down Fraudulent Anti-Spyware Company

The FTC has successfully shut down a web site that claimed to remove spyware from infected machines, when it did, in fact, nothing. This site would even claim that it had scanned and detected spyware on your machine, when it had indeed done no such thing. Let's hope that this is the start of increased pressure on all those who seek to profit shamefully from the spyware problem.

Do You Need a Digital ID?

PCWorld.com - Do You Need a Digital ID?

In an attempt to protect customers from identity theft, companies are looking at establishing a digitial id to replace password. This id would likely involve some form of biometric information such as a fingerprint. Such security would likely increase protection, but it would not be foolproof.

Alternative browser spyware infects IE

Alternative browser spyware infects IE | The Register
Even though browser alternatives help protect against spyware, if you have Internet Explorer on your computer, it is possible for them to install the unwanted software anyway. The moral of this is that while you can make yourself more secure, perfect security is impossible.

Ten Not-So-Simple Rules for Using the Internet

Ten Not-So-Simple Rules for Using the Internet

Offers some good advice for protecting yourself on the web. Essentially, the advice is for maintaining control over your computer amidst many programs and people who would like to take that control away.

Wells Fargo Web-enables 6,200 ATMs

Wells Fargo Web-enables 6,200 ATMs - Computerworld

Wells Fargo is installing Windows based systems on its ATM's. How does this concern you? It means that the flaws present in Windows systems will now appear in ATMs.

Countering the “Rootkit” threat

Techworld.com - Countering the “Rootkit” threat

The newest threat against computers is the "rootkit" virus that can implant itself on your computer with even greater secrecy than other viruses and can require you to completely reformat your hard drive in order to remove it. The rise of rootkits is leading to the rise of programs designed to locate and remove them - and so the story continues.

Wireless Carriers and Adult Material

Technology News Article | Reuters.com

Wireless companies are thankfully recognizing a need to help protect children from accessing adult related material through mobile telephones. While unsolicited e-mail messages are banned, there are no laws addressing indecency in wireless phone e-mail. Hopefully this will be a further step in the importance of wireless to engage in self-policing.

Thursday, March 10, 2005

eBay scrambles to fix phishing bug

eBay scrambles to fix phishing bug | CNET News.com

Ebay, since it is such a major site on the web, often finds itself a target of phishing scams. So it has also taken several steps to protect customers - including establishing an internal e-mail system so that customers no longer are tempted to respond to bogus e-mails asking for personal information. Still, these phishers are a persistent group and now are trying to trick people by asking them to log into sites that look very similar to Ebays. All the more reason to be very, very, very hesitant to give out personal information to anyone.

Another case of massive consumer data theft

Another case of massive consumer data theft

On the heels of the ChoicePoint data theft is another case of a massive amount of personal information including Social Security numbers from a website that failed to sufficiently protect its data. If there is one good thing that is coming out of this it is the recognition that better laws need to be put in place if these companies who profit from our personal information are to take better care of protecting that information.

Child Abuse and Spyware

Child Abuse and Spyware

Fighting child abuse is an unpleasant, but necessary task which is made even more difficult due to the large amount of spyware present on websites containing illegal and offensive material. Fortunately, the increasing ability of computer anti-spyware programs to pro-actively block this form of malware is making the job of those seeking to protect children and prosecute criminals easier.

Wednesday, March 09, 2005

Virus authors switch from havoc to profit

Virus authors switch from havoc to profit - vnunet.com

As mentioned earlier, virus writers have learned that secretly stealing information off of your computer is more financially advantageous than trying to get your computer to stop working. This, of course makes it more difficult to know that your computer is not working properly and requires more security consicousness.

Hackers 'poison' search engine results

Hackers 'poison' search engine results - Computing
Faced with a more and more difficulty of getting unsuspecting computer users to download suspicious files, hackers are now trying to plant bad code on popular web sites and then direct unsuspecting computer users to fake sites where viruses will be installed on their computers. Keep those anti-virus programs updated.

Curiosity Kills MBA Hopefuls' Chances

FOXNews.com - U.S. & World - Curiosity Kills MBA Hopefuls' Chances

Ah, the temptations that Internet access can bring...Unfortunately, the urge to know whether they had been accepted by some of America's most prestigious schools was too much. Now they are paying the price - one that will greatly affect the rest of their lives.

Monday, March 07, 2005

Antivirus Companies Report First Mobile Messaging Worm

PCWorld.com - Antivirus Companies Report First Mobile Messaging Worm

Well it was bound to happen, viruses have struck mobile phones. This virus is not said to be very serious and the article give information on how to remove it from an infected phone, but it could be the first of worse attacks. The same advice for protecting your computer applies to your mobile phone - don't download suspicious attachments.

WORM_SOBER.L

WORM_SOBER.L - Description and solution

This new version of the SOBOR worm spreads via an e-mail attachment purporting to containing some of your personal information in a .zip file. Of course, you should not download this and instead delete it immediately.

WORM_FATSO.A

WORM_FATSO.A - Description and solution
Another worm propogating through MSN messenger. Again, the key is to avoid clicking on suspicious links in your instant messages. More information is available through the link.

WARNING - The Trend-Micro site shows a text file that is implanted on infected computers by the worm and which contains some obscenities.

Windows XP, 2003 Vulnerable to Attack

BetaNews | Windows XP, 2003 Vulnerable to Attack
Another vulnerability to Windows XP has been announced, involving possible DOS [denial of service] attacks. Fortunately, it can be prevented by using a firewall.

WORM_KELVIR.B

WORM_KELVIR.B - Description and solution
There is a new worm spreading through Microsoft Instant Messenger. TrendLabs has classified this as a medium security risk. If you use IM, don't click on links you don't know are safe. Just as with e-mail, it is always best to contact the sender before hand, just to check.

Security Watch: Crafty Bagle viruses keep spreading

Security Watch: Crafty Bagle viruses keep spreading - CNET reviews
This is an interesting article about the changing nature of computer viruses. In the past, viruses have sought to infect as many computers as possible as quickly as possible. A new wave of viruses may instead seek to infect only a few computers so that its attack is more likely to go unnoticed. These new viruses will not seek to shut down your computer, but instead to take over control of your computer and use it to send out spam or your personal information. The best defense is still not downloading suspicious attachments and keeping your firewall and anti-virus program updated and running.

Tracking PCs anywhere on the Net

Tracking PCs anywhere on the Net: ZDNet Australia: News: Security
This can be either good news or bad. A doctoral student at the University of California has demonstrated that you can identify any computer on the internet through its internal clock. This means an end to anonymous web surfing. On the one hand, it could make it easier to catch criminals on the net on the other hand, it could also be used to keep track of what you may be looking at from your own computer.

Policing the Virus Writers: Good News?

PCWorld.com - Policing the Virus Writers: Good News?
While there have been some recent arrests of virus writers, the majority of those who send out malware are likely to remain unfound and unprosecuted unless they brag about what they have done. So, don't count on law enforcement to significantly diminish the threat that viruses pose to Internet security. The first line of defense will always be ensuring that you are using your computer wisely.

Sunday, March 06, 2005

eBay scrambles to fix phishing bug

eBay scrambles to fix phishing bug | CNET News.com
Users of eBay beware! Phishers have found a way to redirect you from a real eBay link to a false link seeking to steal your personal information. These real links are included in fake e-mails purporting to come from eBay. EBay is currently working on a solution, but to be safe - never click on a link from an e-mail message. Instead, type in eBay's web address by hand and sign into your account there. If a message is really coming from eBay, it will be there.

Friday, March 04, 2005

PCWorld.com - New Bagle Variant Combines Spam, Trojan Horses

PCWorld.com - New Bagle Variant Combines Spam, Trojan Horses

Be on the lookout for this new virus that hides as an attachment and installs a Trojan on your computer. Keep your anti-virus programs updated and never download suspect attachments, files, pictures. If someone you know sends you an attachment always e-mail them for confirmation that they did indeed send the attachment before opening it.

PCWorld.com - Caught a Virus?

PCWorld.com - Caught a Virus?

PC World offers this fine piece on what to do if your computer is unfortunately affected by a computer virus.