Information about vulnerabilities that may effect your computing

Spyware: The New Annoying Threat

July 15, 2010 admin 0

So what is this spyware? Spyware is software that collects personal information from your computer without your knowledge of the occurring event. Information gathered from spyware ranges from the collection of all web-browsing activities to collecting sensitive information like usernames, passwords, address and even your social security number. Spyware has the ability, when installed, to modify system settings, which perform undesirable tasks on your computer system. Furthermore, spyware has been known to redirect user’s web browsers, cause computers to dial services for which they are billed and install DLLs and other executables files to send your personal data to another computer. This is done by using the computer’s memory resources and also by utilizing bandwidth, as it sends information back to the spyware’s home server via the user’s Internet connection. Because the spyware program is using memory and system resources, the applications running in the background can lead to system crashes or general system instability. […]

Microsoft Security Bulletin Summary for July 2010

July 13, 2010 SecurityOrb_Staff 0

This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message. […]

Adobe Systems Patches 17 Critical Security Holes

July 1, 2010 admin 0

On June 29, Adobe Systems plugged 17 critical security holes affecting Adobe Reader and Acrobat including a patch for a zero-day vulnerability that impacted many of their other products, on multiple operating systems such as Windows, Mac and Linux. The new versions of Acrobat and Reader are 8.2.3 and 9.3.3, but Adobe strongly recommends using the version 9.x products. […]

Types of Wireless Attacks

June 13, 2010 admin 0

Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in the middle attacks and the WEP key-cracking attack to name a few and are described below. […]

Computer Malware and Preventive Recommendations: Botnets

June 13, 2010 admin 0

Botnets are one of the fastest growing and the most dangerous threat on the Internet today. “Bot” stands for robot, which is a piece of software with some intelligence to perform a task and the “net” stands for network which is the collection of these individual bots under one controlling person called a bot herder. […]

1 8 9 10
error: Content is protected !!