Newsletter Sign Up
Latest News
2024-10-25 eBay Account Hijacked
The true story of a friend trying to answer questions for an item he was selling on eBay and became a victim of Cross Site Scripting. In this article we take a deeper look at this vulnerability and what you can do to prevent getting your cookies stolen. If you sell anything on eBay, you'll want to read this article.
2024-11-20 Does a home user need a router for added security?
I have read all of your reviews on
the virus software companies. My question is; does a home user need a
router for added security? I have been told by many who use computers
that it's a good idea. The only one who said that I should "take it
back to the store", was a tech support worker at my ISP. Well what is
your opinion?
Thank You, Mr. Ford
To Have or Not to Have... that is the question.
To
answer the question, should you install a router, we need to address
what functions the router adds, and which of these functions are
security related. Then, look if these services and functions are being
supplies elsewhere.
2024-10-09 Understanding Heuristics
The hot term in antivirus programs this year is 'heuristics'. In this article we take a deeper look at what it is, and how it can help protect you against viruses that haven't been identified and labeled yet.
Top Ten Viruses
Date: 2024-07-24
Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage.� �New viruses are created daily.� This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.
Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.
Virus: W32.Beagle.CO@mm Virus: Backdoor.Zagaban A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance. Virus: W32/Netsky-P Virus: W32/Mytob-GH Virus: W32/Mytob-EX Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER This family of worm variations possesses similar characteristics in terms of what they can do.� �They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network.�� Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).
A mass-mailing worm that lowers security settings.� It can delete security-related registry sub keys and may block access to security-related websites.
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.
A mass-mailing worm and IRC backdoor Trojan for the Windows platform.� Messages sent by this worm will have the subject chosen randomly from a list including titles such as:� Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. �W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. �This virus spreads by sending itself to email attachments harvested from your email addresses.
Comments
No comments so far.