Added by SkiCat56 on April 29, 2010 at 11:40am —
Added by SkiCat56 on March 31, 2010 at 10:28am —
Charlie Miller won't hand over 20 flaws he found by fuzzing Mac OS, Office, Adobe Reader
Added by SkiCat56 on March 26, 2010 at 2:45pm —
Should you change your passwords often? What’s the risk if you don’t? Little did I know, listening to one podcast would cause me to rethink how I
would answer those questions.
- Date: March 15th, 2010
- Author: Michael Kassner…
Added by SkiCat56 on March 17, 2010 at 12:51pm —
Added by SkiCat56 on March 9, 2010 at 8:27am —
Microsoft Warns of F1 Site Attack
A new security advisory from Microsoft warns about a risk involving any version of Internet Explorer on Windows 2000 and Windows XP that can allow a malicious Web site to infiltrate your PC.
The vulnerability, detailed… Continue
Added by SkiCat56 on March 4, 2010 at 11:20am —
February 19, 2010, 06:10 AM — IDG News… Continue
Added by SkiCat56 on February 19, 2010 at 1:53pm —
Fake Microsoft Outlook Update Installs Trojan
A malicious spam campaign caught by Panda Labs is using a fake Microsoft Update notice to trick victims into installing a Trojan. While well crafted, the attack still provides dead… Continue
Added by SkiCat56 on February 4, 2010 at 8:59am —
A security expert is taking on Google. His innovative Firefox add-on prevents Google from tracking your whereabouts on the Internet.
# Date: January 25th, 2010
# Author: Michael Kassner
# Category: Security
Any security pundit worth their salt knows about Moxie Marlinspike. You may remember Marlinspike getting a… Continue
Added by SkiCat56 on January 26, 2010 at 3:07pm —
January 14, 2010 5:40 PM
IE Exploit Used to Launch Chinese Attacks on Google
By Tony Bradley
Early speculation focused on the Abobe Reader zero-day exploit as the source of the Chinese attacks on Google and other corporations earlier… Continue
Added by SkiCat56 on January 21, 2010 at 10:34am —
Derek Schauland outlines the basics of CCleaner for keeping your computer optimized and helping you get rid of the mess that piles up from Internet surfing, old applications, and other fragments.
Product Spotlight: CCleaner
Date: January 8th, 2010
Author: Derek Schauland
Keeping your computer moving like the day it… Continue
Added by SkiCat56 on January 11, 2010 at 12:30pm —
Identify a Phishing Scam
From Wired How-To Wiki
Hold on to your passwords if you want to stay safe on the internet. Of course, you need those passwords to access your bank, your e-mail and sites where you connect with friends. There are people out to trick you into giving those private codes away using a scam called "phishing." Let's look at how to… Continue
Added by SkiCat56 on January 6, 2010 at 11:48am —
January 4, 2010 12:41 PM PST
Understanding Windows 7's 'GodMode'
by Ina Fried
Windows 7's so-called GodMode is actually a shortcut to accessing the operating system's various control settings.
(Credit: CNET News)
Although its name suggests perhaps even grander capabilities, Windows enthusiasts are excited over the… Continue
Added by SkiCat56 on January 5, 2010 at 1:07pm —
Credit-card extended warranties come in handy
By Dennis O'Reilly
Most experts recommend against paying for an extended warranty when you purchase a PC or peripheral, partly because you may already be covered beyond the vendor's standard warranty period.
If you used a credit card to buy the system, your card company's extended warranty could be the key to a free… Continue
Added by SkiCat56 on December 14, 2009 at 11:38am —
Posted by Sam Diaz @ 11:38 am
Google is taking control of the Internet’s equivalent of the telephone switchboard, called the Domain Name System, or DNS. In a blog post this morning, Google announced the release of a public DNS resolver called Google Public DNS, one of the things that the company is doing as part of its ongoing effort to make the web… Continue
Added by SkiCat56 on December 4, 2009 at 9:18am —
ARTICLE DATE: 07.07.09
By John C. Dvorak
The glory days of Microsoft ended with Vista for one reason, and one reason only: Vista Ultimate. It was part of an ill-advised scheme called "subtractive marketing" or "fake versioning"—purposely taking features out of a finished product to create an artificial range or selection.
Who ever dreamed up the Vista Ultimate moniker, I consider that individual… Continue
Added by SkiCat56 on July 8, 2009 at 6:08pm —
June 24, 2009 4:59 PM PDT
by Elinor Mills
Updated June 25 at 9:00 a.m. PDT with Trend Micro saying the Trojan is harmful to Macs and PCs.
Venture capitalist Guy Kawasaki got more than he bargained for from an automated feed he set up on his Twitter account.
Some of Kawasaki's more than 139,000 Twitter followers noticed something strange when they saw a particular non-VC-related tweet sent… Continue
Added by SkiCat56 on June 26, 2009 at 8:36am —
The iPhone may have begun the smartphone's transition into a full-fledged computer, but lots needs to change before we get there. Here's my wish list.
by John C. Dvorak
As the world begins to adjust to the mobile phone as a computing platform, we have to recognize the fact that for many people the device is bound to become the complete substitute for all computing needs. But not quite in the form we see… Continue
Added by SkiCat56 on June 17, 2009 at 4:32pm —
Top Story, June 11, 2009
By Susan Bradley
The hacker scripts try to infect site visitors and then attempt to use their compromised PCs to spread the infection to yet other… Continue
Added by SkiCat56 on June 11, 2009 at 1:26pm —
June 5, 2009 5:27 PM PDT
by Elinor Mills
Jeff Moss, founder of the Black Hat and Defcon hacker and security conferences, was among 16 people sworn in on Friday to the Homeland Security Advisory Council.
The HSAC members will provide recommendations and advice directly to Secretary of Homeland Security Janet Napolitano.
Moss' background as a computer hacker (aka "Dark Tangent") and role as a… Continue
Added by SkiCat56 on June 8, 2009 at 11:54am —