Friday, April 29, 2005

Tips for Protecting Yahoo and other Passwords

Security Awareness for Ma, Pa and the Corporate Clueless: Tips for Protecting Yahoo and other Passwords

Here is some good advice for chosing passwords for yourself while you are surfing. While it is possible to get programs that crack passwords, it is also possible to make it so difficult as to make using these programs not worth the effort.

Do You Suffer from Email Domain Shame?

Do You Suffer from Email Domain Shame? Many AOL, Hotmail, Yahoo and Other Users Do - Reported by Aunty Spam's Net Patrol

A very interesting piece about the prejudices that some have regarding e-mail addresses. Gmail, like I have thank you very much, is a sign of being tech savy. Hotmail and Yahoo are not so good in terms of "coolness". What does your e-mail extension say about you?

Students become recent victims of credit and debit card fraud

April 28, 2005 - Students become recent victims of credit and debit card fraud

More cases of identity theft, this time involving students at Ithaca University. The stories here don't involve a single mass case as has recently happened with Lexis/Nexus for example, but instead shows the personal costs of identity theft.

Symantec AntiVirus Problems

Secunia - Advisories - Symantec AntiVirus Products RAR Archive Virus Detection Bypass

A problem with several Symantec products including Norton Anti-virus has been patched - if you use any Symantec products check out the warning to see if it affects you and, if so, go to the Symantec site to get the patch.

New Windows Virus Wipes Out MP3 Files!

New Windows Virus Wipes Out MP3 Files! Is the Nopir-B Worm Aimed at Pirates? - Reported by Aunty Spam's Net Patrol

If you have any MP3 audio files on your computer, you need to be careful about this Nopir-B worm which is wiping them off of computer hard drives. It may have initially been targetted at MP3's that had been illegally obtained through programs such as Gnutella but it not discriminatory in terms of which files it deletes - legal or not.

New Virus Count Nearly Triples In Six Month Timeframe

Security Pipeline | New Virus Count Nearly Triples In Six Month Timeframe

As a sign of the continuing treacherous nature of the web, the number of viruses continues to increase. Most of these are variations of other viruses rewritten in order to better bypass anti-virus programs and another reason for keeping these programs updated.

Tuesday, April 26, 2005

Students go 'phishing' for user info

IDSnews.com

This is a really interesting article about a study that some Indiana students did concerning the relative ease people would give up personal information if they believed that they had received an e-mail from one of their friends. Not only was the study interesting for the results but also for the reaction of the students who feel violates.

See this link for reactions.

Browser Hijacking

Browser Hijacking

Another good article from about.com, this time about browser hijacking - that is, when malicious software often picked up when surfing causes your Internet browser to go completely haywire. Much of this malicious software comes from popups and from those times that you mistakenly type in an Internet address - perhaps gogle.com instead of google.com and find out that gogle.com is run by some pretty bad folks who want to give you things you would rather pass up.

Read the article for some good advice on protecting yourself.

In 2004 an average of 2,500 Web servers were hacked daily

In 2004 an average of 2,500 Web servers were hacked daily > Security > IT Facts

As a sign of the growing threat that the Internet faces, the number of sites that were hacked into rose by over 400,000 compared to 2003 figures. That is certainly a lot of sites. IT Facts has some additional impressive statistics you should look at.

WarDriving: Can WarDrivers Crash Your Wifi Party?

WarDriving: Can WarDrivers Crash Your Wifi Party? - Reported by Aunty Spam's Net Patrol

Here comes another word for your Internet Safety lexicon - wardriving. Wardriving takes place when an unauthorized person gets onto your wireless system and uses your wireless service for free. If you have wireless service in your home, make sure that you have at least WEP encyrption set on your router.

Ten Tips to Prevent Identity Theft

Ten Tips to Prevent Identity Theft

This is a nice piece from about.com about Identity Theft and how to protect yourself from it. There are several basic steps that anyone can take to protect themselves and to save themselves a lot of money and headache.

E-mails 'hurt IQ more than pot' - Apr 22, 2005

CNN.com - E-mails 'hurt IQ more than pot' - Apr 22, 2005

I tend to get a lot of e-mail, mostly from various e-subscriptions I have. I haven't noticed any lowering of my IQ as this survey demonstrates but maybe I should be on the lookout for signs, eh?

Spam Slayer: New Tools Fight Fraud and Phishing

PCWorld.com - Spam Slayer: New Tools Fight Fraud and Phishing

This is a nice review by PCWorld of some different anti-phishing tools that are out there. You may want to take a look and see if any might be of interest.

Hackers Plot Phishing Scams, Mobile Viruses

PCWorld.com - Hackers Plot Phishing Scams, Mobile Viruses

No surprise here. The same folks who brought us virus and worms in the past are moving into phishing because it is more profitable. All the more reason to look at buffing up your browser to identify phishing scams. Firefox has a Spoofstick that lets you know that you are on the site that you want to be. There are other services out there that also help you to verify your Internet surfing. Many of them cost money, but it could be worth it if it keeps you from giving out your personal information to the wrong people.

Carnegie Mellon Says Computers Breached

Carnegie Mellon Says Computers Breached (washingtonpost.com)

Another case of possible identity theft strikes - this time affecting 5,000 students, staff and graduates of Carnegie Mellon. So far no evidence that anyone's identity has been stolen but it is clear that their computer security failed. And so it continues.

Friday, April 22, 2005

RealNetworks fixes 'highly critical' flaw

RealNetworks fixes 'highly critical' flaw | Tech News on ZDNet

If you use RealNetworks software such as Real Player be sure to get a recent patch designed to fix a flaw that might allow malicious individuals to hijack your computer.

Viruslist.com - Analyst's Diary

Viruslist.com - Analyst's Diary

As a sign of the increasing popularity of the Firefox browser, bogus emails are being sent to web site operators in an attempt to get them to look at an attached picture supposedly showing that their web site is not Firefox friendly. The attached picture is actually a Trojan virus.

Security Watch: Vulnerabilities Plague Software Industry

Security Watch: Vulnerabilities Plague Software Industry

PCMag is reporting on two important Windows Updates that you may not have gotten yet, even if you have gone to the Windows Update site. Check out the article and make sure that you are protected.

Widespread Internet Attack Cripples Computers with Spyware

PCWorld.com - Widespread Internet Attack Cripples Computers with Spyware

This newest attack of malevolent spyware is mostly a problem for DNS servers - those sites that help guide you to the web pages that you are really looking for. Attacks called DNS poisoning cause these servers to send you to places you don't want to go and often these fraudulent sites try to infect you with spyware. The best way to protect yourself is to keep your browser and anti-virus software updated. So far, only those using an unpatched Internet Explorer are affected. So keep up on those updates or switch to another browser like Firefox or Opera.

Wednesday, April 20, 2005

Cyber Bullying Becomes A Big Problem

Cyber Bullying Becomes A Big Problem (Talk)

As if worms, spyware, adware, and viruses weren't bad enough, the internet has also helpoed to create a problem of cyber bullying. Such bullying is bad enough when it just concerns problems in the school, but with the internet it can quickly spread throughout the world. So, if you know someone who may be being bullied it is important that you take action to stop it immediately.

The Real Deal: Keep deleted cookies from sneaking back and spying on you

The Real Deal: Keep deleted cookies from sneaking back and spying on you - CNET reviews

Internet cookies are generally a safe means by which retailers try to improve their relationship with their customers, but some cookies are not so good and are becoming instead means of tracking computer users behavior. This article talks about the problem and offers advice on blocking cookies on your computer if you wish to make yourself more secure.

Teenagers struggle with privacy, security issues

SecurityFocus HOME News: Teenagers struggle with privacy, security issues

Teenagers are some of the most vulnerable to the problems of Internet Security. They use computers a lot, but aren't aware of the type of threats that also exist out there. Unfortunately, often their parent's aren't very adept at computer use and so aren't able to provide important information about computer safety. It is my hope that until parents are able to become more computer savy that teachers will be able to step in to offer advice, especially if there is easy computer access at their schools.

AOL to Block Identity Theft Sites

Yahoo! News - AOL to Block Identity Theft Sites

Another piece of good news. AOL is helping to protect its customers by blocking fraudulent web sites. Hopefully other internet providors will follow AOL's example. If these sites are blocked, hopefully this will both keep the unsuspecting from falling victim but it might also encourage the criminals to seek a better line of work.

Spyware Could Cost You $2M In Washington State

Internet Week > > Spyware Could Cost You $2M In Washington State > April 19, 2005

Now this is the kind of legislation I'm looking for. In Washington State, if you are found guilty of using spyware or phishing to steal someone's private information, you can be both prosecuted by the governement and sued by victimized customers. This will likely not have much effect on those criminals acting outside the US, but it might help here at home.

When iPod goes collegiate

When iPod goes collegiate | csmonitor.com

As a teacher interested in technology's impact in education, I found this to be a fascinating piece on the use of IPod's in the courseroom both in terms of how it affected student learning as well as new issues regarding copyright of lectures. It might be something to try in my classes, if I could persuade all my students to get IPods.

1.4 Million Affected by Retailer ID Theft

BetaNews | 1.4 Million Affected by Retailer ID Theft

Yet another case of massive identity theft - this time involving DSW Shoe Warehouse and involving 1.4 million people. When will the government step in and pass laws about this? Perhaps only when our senators and representatives have their identity stolen and their credit rating ruined.

New Sober Variant Speaks German

PCWorld.com - New Sober Variant Speaks German

Another computer problem has made itself known. Bogus e-mail going out with a subject header "I've_got your EMail on my_account!" contians an attachement that infects your computer and seeks to send itself to others in your e-mail accounts. Make sure your anti-virus is updated and don't click on unknown attachments.

Sunday, April 17, 2005

What a wierd world this is - buy stock in my stuff!

BlogShares - Isidore's Corner

I really don't know what to think about this. There are still no links to Friary Notes, but it is now apparently possible to buy stock in Isidore's Corner. Now, I just want you to know that I had nothing to do with this and I don't know what this means about my vow of poverty.

Does this mean that Isidore's Corner is more popular? I don't really know. I hope that if it is, some of this popularity might wear off on the Isidore's Corner web site when it finally goes up.

Should I buy stock in my blog, in case it comes under attack by a hostile takeover?

Firefox 1.0.3 released

If you are a Firefox user, a new version has been released that patches up some important security issues. I would advise downloading it immediately.

Internet Week > Flash Player Worries Privacy Advocates > Flash Player Worries Privacy Advocates > April 15, 2005

Internet Week > Flash Player Worries Privacy Advocates > Flash Player Worries Privacy Advocates > April 15, 2005

Many people, including myself, use Macromedia's Flash player. Many of these people, including myself are unaware that it keeps track of personal imformation about its users. While Macromedia does not think that this could be a privacy threat, others might disagree. If you do, there is a means of making sure that Flash does not retain information bout you and the sites you visit. Go to the Flash web site and read the information about privacy settings.

Credit Card ID Theft Affects 180,000

BetaNews | Credit Card ID Theft Affects 180,000

Yet another case of identity theft and it again affects hundreds of thousands of people. This time the victims are those who have GM-branded Master Cards and used them at Polo Ralph Lauren stores.
How many victims will it take before some serious steps are taken to protect customers - note that the article makes the point that other banks may have also been affected but the law does not require them to inform customers that their credit card numbers may have been stolen. That makes it pretty difficult to protect yourself.

Viruses on the Rise Despite Antivirus Software

Technology News: Security: Viruses on the Rise Despite Antivirus Software

No suprisingly, the number of computer viruses and other threats continues to grow. As the article notes, the best means of protection is not the anti-virus or anti-spyware programs - those they are helpful and beneficial. The best means of protection is to remain always cautious, never downloading suspicious attachments, never going to suspicious web sites. If you don't open that suspicious attachement, you don't need to worry about whether your anti-virus program would keep it out.

Wednesday, April 13, 2005

Hackers Use Blogs To Spread Worms, Keyloggers

TechWeb | blogs spewing worms, viruses, spyware | Hackers Use Blogs To Spread Worms, Keyloggers

Blogs are becoming a new source for viruses and other malware. The bad guys are creating their own blog sites, infesting them with bad programs and trying to entice unsuspecting to visit the sites - where they are infected.

While blogging sites like Blogger can help protect people by keeping bloggers such as myself from uploading certain file types, the best way you can protect yourself is by only visiting reputable bogs and keeping your antivirus software updated. Popup blockers are also helpful.

Possible Unpatched Office Flaw Investigated

PCWorld.com - Possible Unpatched Office Flaw Investigated

Apparently, Microsoft did not get all the critical problems fixed this time around. Secunia is advising that if you run Microsoft Office, do not open any ".mdb" files that may be sent to you via e-mail. Since Windows normally hides file extensions, detecting file endings is difficult unless you change the settings to show file extensions.

To show file extensions, click on the "My Computer" icon, click on "Tools", click on "Folder Options", click on "View", make sure the box for "Hide extensions for known file types" is unchecked.

Microsoft Fixes Critical Security Holes

BetaNews | Microsoft Fixes Critical Security Holes

Microsoft has come up with some new important patches for security problems in Windows and Microsoft Office. It is important that you download these patches immediately, if you have not already done so. Simple, go to Windows Update to get the downloads. If you have Microsoft Office, you will also need to go to the Microsoft Office page and click on "Office Update".

RIAA to Sue 405 More College Students

BetaNews | RIAA to Sue 405 More College Students

The recording industry is going after more college students for illegally downloading music. Now, I am one who is loath to spend the kind of money asked for new CDs today, but I also think that the people who make the music have the right to charge whatever they want. If you don't like it, buy something else or try getting the songs you want via a legal source like Napster or ITunes.

If people continue to violate copyrights by downloading media illegally, the risk is that people will no longer want to be creative because their will no longer be a monetary incentive. Rampant illegal copying in the far east has devastated their domestic music industry. It just doesn't make sense to spend the money and effort at coming out with a CD only to have someone steal it and sell their own copies.

LexisNexis ID Breach Worse Than Thought

FOXNews.com - U.S. & World - LexisNexis ID Breach Worse Than Thought

LexisNexis is now reporting that it may have lost the personal data of 310,00 people including names, addresses, social security info, and drivers license numbers. Out of the generosity of their hearts they are offering free credit reporting for a year, so I guess the criminals only have to wait a year before they start profiting on their misdeads. Unless the poor victims of this theft can manage to change their identification information at every possible location that it exists.

Though, it seems as if the criminals are not waiting that long after all. Reuters is reporting that 59 cases of data theft have already shown up.

Tuesday, April 12, 2005

Mississippi joins list of colleges leaking data

Mississippi joins list of colleges leaking data - Spam, Scams & Viruses - MSNBC.com

I don't know whether I find things like this story sad, scary or just another case of institutional foolishness. I guess Mississippi State should be happy that someone who found out that the private information of hundreds of students was available through a Google search was honest enough to point out the huge security leak.

You may wish to Google yourself, just to find out where you are listed and what information about yourself is out there.

Monday, April 11, 2005

How the Internet Is Dying

How the Internet Is Dying - MC Press Online

This is an informative article about the threat of DNS poisoning - that's a computer problem, not a physical problem. I don't know whether the author is correct in warning of the dying of the internet. I do know that people are getting far more wary of using the internet because of continuing security problems. At what point will something created to foster the sharing of information collapse out of fears over what kind of information is actually being shared?

Russian hackers 'the best in the world'

Russian hackers 'the best in the world' - ZDNet UK News

So, the Russian police are claiming that the Russian hackers are the best in the world [insert appropriate Cold War music here]. I guess, when it comes to security threats - if I'm affected by a virus I worry less about the nationality of who wrote it than about how to get rid of it and avoid it again. Still, perhaps it's their revenge for sending them American television.

Hacker Highschool

Hacker Highschool - www.hackerhighschool.org

Hacker Highschool was established to help teens learn means of protecting themselves from the perils of internet fraud, identity theft and more. While I can certainly support informing students, I hope that they are learning more about protecting themselves, than about attacking others.

Internet Anxiety Disorder Anyone?

Om Malik on Broadband � Internet Anxiety Disorder Anyone?

New technology means new disorders, this time it is Internet Anxiety Disorder - or the fear of spending time away from an Internet Connection, always worried that you may be missing something. I guess maybe you are - life isn't experienced through a modem. Of course, perhaps I have already been affected.

Saturday, April 09, 2005

Man Sentenced to Prison for EBay Scam

PCWorld.com - Man Sentenced to Prison for EBay Scam

Another case of internet crime being punished. A man who bilked ebay customers out of about $120,000 has been sentenced to six years in jail and orderd to pay $118,000 in restitution - because the judge did not think that the defendent had sufficiently accepted responsibility. Personally, I think he should just have to face all those he defrauded.

Top Spammer Gets 9 Years in Prison

BetaNews | Top Spammer Gets 9 Years in Prison

For some good news, another spammer has been prosecuted and sentenced to nine years of jail. Of course, the case is still on appeal. The irony is that the spammer, who made about 750 thousand dollars a month bombarding people with ten million e-mails a day is arguing that the law banning spam violates his free speech. Somehow, it seems to me that if you are making that kind of money - your speech is no longer free for someone.

Google Ads for Cheap Airline Tickets Actually Phishers?

Google Ads for Cheap Airline Tickets Actually Phishers? - Reported by Aunty Spam's Net Patrol

Aunty Spam is reporting that some of the travel ads that appear as a result of Google searches are actually fraudulent sites seeking your credit card information and then charging you for non-existent tickets. Always deal only with trusted and reputable sites.

Microsoft Readies Critical Software Patches

PCWorld.com - Microsoft Readies Critical Software Patches

Microsoft is planning to issue eight security patches for Windows, MSN Messenger, Office and Exchange on tuesday. Again, these should be obtained directly from the Microsoft Update site.

WARNING - Phishing scam targets Windows update

Computerworld | Phishing scam targets Windows update

There is a malicious email making the rounds that claims it is from Microsoft and asking the computer user to make an urgent update. The update is fraudulent and actually installs a virus on the computer. All real updates should come directly from Microsoft's update page which should always be reached either by typing in the address directly or using the Window's update link from your start menu.

Teachers leave grading up to the computer

Teachers leave grading up to the computer | CNET News.com

As a teacher, I couldn't pass up this piece. I have often said that any teacher who could come up with a way to grade essays more quickly would likely be canonized by the educational establishment. Well, it seems that one university professor may be almost to sainthood. The University of Missouri is using a new program designed to help grade student essays by scanning for keywords, phrases and language patterns. Apparently it is only used on initial drafts of papers, while the final draft is indeed graded by a human person. I know that this can be unnerving to students, but if I had to grade 140 papers in a writing intensive course, I might be looking for this program too.

Antivirus Company Warns of New Smart Phone Trojan

PCWorld.com - Antivirus Company Warns of New Smart Phone Trojan

If you use a cell phone using the Symbian Series 60 operating system you could be at risk of a trojan virus attack that could damage your phone and make it impossible to reboot. Phones can only be infected by downloading the virus from a web site or peer to peer network. The virus file is named "Kill Saddam by OID500.sis".

IT Observer - Zombie Computers

IT Observer - Zombie Computers

This blog and other computer security sites often refer to "zombies" with respect to computer problems. This article explains in good detail exactly what is meant by a "zombie" and why it is such a problem. As the article notes, if your computer becomes a "zombie" it can do all sorts of bad things, several of which are illegal and may make you run afoul of the law. This is why it is so important to have a firewall on your computer and to keep your anti-virus software updated.

Wednesday, April 06, 2005

Computer System Security: A Primer

Computer System Security: A Primer

Dell is offering a good guide into computer security both by explaining the different types of problems as well as helping people familiarize themselves with a computer language that can seem extremely confusing.

ABC News: Kids, Infants Fall Victim to Identity Theft

ABC News: Kids, Infants Fall Victim to Identity Theft

This is a very sad story demonstrating that anyone can fall victim to identity theft - even children. This is why it is highly advisable that you keep constant tabs on your financial accounts and credit history. Apparently, parents should do this for their young children as well.

E-mail worm graduates to IM

E-mail worm graduates to IM | Tech News on ZDNet

This is a warning about a new worm that attacks via Microsoft Instant Messenger and also affects other programs that use Instant Messenger such as Trillian to steal passwords and other personal information. The worm must be downloaded to affect one's computer so keep avoiding suspicious attachments on your instant messages.

Is identity theft inevitable?

Is identity theft inevitable? | Perspectives | CNET News.com

This is an interesting article about the current lack of preparedness of many government and financial agencies to protect the private data that they require us to provide. It is important that we come to understand the dangers that such lack of protection promotes and work to pass legislation requiring the government and financial institutions to protect all of our private information with the best available security tactics and encourage computer experts to help make security better.

Web Postcards Hide Trojan Horse Programs

PCWorld.com - Web Postcards Hide Trojan Horse Programs

The popularity of web postcards or e-cards has generated a new virus threat as criminals send emails announcing that a user has received an e-card, but when the user goes to view the e-card, they get attacked by a computer virus. So, it would seem that just as with any suspicious e-mail, it is advisable to e-mail the sender first to confirm that an e-card has been sent before attempting to open the e-card and be sure to type in the web address rather than simply clicking on the link in the e-mail.

Backdoor security attacks - At The Whiteboard - ZDNet

Backdoor security attacks - At The Whiteboard - ZDNet

For those who would like a video as opposed to a print presentation about the dangers of viruses, spyware, and other security issues, ZDNet has a list of free videos available. You must have either Real Player or Windows Media Player to view the video or you can download them from the ZDNet page.

IM Security Threats Jump Dramatically

BetaNews | IM Security Threats Jump Dramatically

As the popularity of Instant Messaging increases so is the threat of viruses designed to specifically attack computers through IM. The attacks are generally the same as with e-mail - an attempt to trick the computer user into downloading a malicious file. The problem is more severe because many anti-virus programs do not scan Instant Messages. Thus, the best protection is to never download suspicious attachments either on your e-mail or on your Instant Messages.

Law Seeks To Stop Modem Hijacking

CBS News | Law Seeks To Stop Modem Hijacking | April 5, 2005 12:00:10

New York has passed the first law designed to prevent your modem from being hijacked. That is, some criminals try to get your computer to dial long distance phone numbers for them and then stick you with the bill. This problem usually affects dial-up users and not cable computer users.

Tuesday, April 05, 2005

FileForum | Mozilla Firefox for Windows

FileForum | Mozilla Firefox for Windows

Firefox has repared the javascript problem noted earlier in this update, so if you use Firefox, be sure to download the update soon.

How about that, serious flaw in Firefox fixed next day - serious flaws in Internet Explorer still not fixed. Reasons for staying with IE? Zero.

Monday, April 04, 2005

InformationWeek > Flawed JavaScript Engines > Firefox, Mozilla Bug Exposes Data > April 4, 2005

InformationWeek > Flawed JavaScript Engines > Firefox, Mozilla Bug Exposes Data > April 4, 2005

Firefox and Mozilla have also had some flaws revealed which are serious. These flaws are unpatched and concern the browsers use of JavaScript. The attached article has a link to check to see if you are affected. Again, this is only for those who use Firefox or Mozilla as their browsers. If you are affected, you should turn off JavaScript until the flaws are fixed, note that this may affect your ability to view certain sites. A good way to turn your javascript on and off easily so that you can keep in working on trusted sites and turn it off when you are just surfing the web is to download the PreBar extension.

New bugs found in Outlook, Internet Explorer: Internet News from The Industry Standard

New bugs found in Outlook, Internet Explorer: Internet News from The Industry Standard

Two new flaws have been found in Internet Explorer and Microsoft Outlook. The flaws have not been patched and there is no explicit mention of what the flaws might be. On the one hand that helps keep the bad guys from exploiting the flaws, on the other hand it also keeps you from protecting yourself.

Gmail tries out antiphishing tools | CNET News.com

Gmail tries out antiphishing tools | CNET News.com

GMail, which has recently updated its storage space to 2 GB for free, is also working on protecting its users from phishing attacks. GMail accounts are still by invitation only and I still have lots of invitations for free to those who e-mail me requesting one.

BetaNews | Political Bloggers Under Fire

BetaNews | Political Bloggers Under Fire

San Francisco is once again proving that liberal doesn't necessarily mean what it used to. The city is seeking to force bloggers to register their logs as a way of censoring political speech. New technology means new problems and new solutions, but it doesn't mean silencing those with whom you disagree.

US-CERT Cyber Security Tip ST05-007 -- Risks of File-Sharing Technology

US-CERT Cyber Security Tip ST05-007 -- Risks of File-Sharing Technology

Many people are using P2P technology to transfer files from one computer to another quickly and easily. P2P technology offers many benefits but also many threats - especially if the file you are downloading is not safe. This article from the US government gives some advice on using P2P software wisely.

SecurityFocus HOME Infocus: Web Browser Forensics, Part 1

SecurityFocus HOME Infocus: Web Browser Forensics, Part 1

This is a very interesting article about computer surveilance. Whether you are concerned about privacy on your own or your business computer or whether you want to be able to protect yourself from people using your computer improperly, this article provides some good information as to how an investigation by a computer forensics expert actually takes place.

PCWorld.com - Microsoft Files 117 Phishing Lawsuits

PCWorld.com - Microsoft Files 117 Phishing Lawsuits

Microsoft is waging war on phishing operations by using copyright laws on those who attempt to mimic real web sites in order to fool customers. Since they are using trademark law, they are more likely to find out the real identity of the scammers.

Altered Grades Lead to Student's Arrest - Daily Nexus Online

Altered Grades Lead to Student's Arrest - Daily Nexus Online

Say goodbye to cheat sheets, now you can just try to change your grades online as this student did. Fortunately, the student was caught and her grades were restored, but I bet she won't be graduating from that university. This story is also another warning about the importance of not using a social security number as a password.

Security Pipeline | CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List

Security Pipeline | CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List

CoolWebSearch is listed as the worst of all the spyware programs and it certainly is a problem to remove. The freeware program CoolWebShredder is an excellent tool to use both to find out if you are infected as well as to remove the infection.

PCWorld.com - Symantec Acknowledges Two Holes in Antivirus Products

PCWorld.com - Symantec Acknowledges Two Holes in Antivirus Products

There are two flaws in some of Symantec programs including Norton AntiVirus and Norton Internet Security. These flaws have been patched, so be sure to update your programs if you are using either of these programs of any other the other Symantec software listed in the article.

MSNBC - Drop the mouse and step away from the PC

MSNBC - Drop the mouse and step away from the PC

It's easy to get frustrated at a computer, even when it isn't malfunctioning. Computers are to many of us mysterious things that we expect to work properly when we need them and when they don't we often don't have the slightest idea of how to fix them. This article talks about steps you should take to get your computer running again and protecting yourself from losing everything when your computer decides to stop working.

Technology News: Security: Pharming Attacks Outwit Even Savvy Surfers

Technology News: Security: Pharming Attacks Outwit Even Savvy Surfers

Pharming, fooling the unsuspecting, by sending them to fraudulent websites in order to get personal information is increasing and so is the need to be aware of the dangers out there - particularly if you are on banking sites. This article gives some good advice on protecting yourself and how banks and other institutions are trying to advance their own technology to stop the criminals.

Euromail - What Germans can teach us about e-mail. By Eric Weiner

Euromail - What Germans can teach us about e-mail. By Eric Weiner

For those of us who have not likely received much e-mail from overseas, the differences in e-mail culture can be striking and say a lot about one's respective national identity. This article offers some interesting insights both into how we treat e-mail as well as how we present ourselves.