Security

Buffer overflow in Safari 3.0.2 for Windows

Following last Friday’s release of Safari 3.0.2 comes a brand-new Monday morning vulnerability. Researcher E. Azizov of ITdefence in Russia posted on the Bugtraq newsgroup a demonstration of a buffer overflow in the Windows XP version of Apple’s browser. Specifically, the new vulnerability affects the title buffer in Safari bookmarks. If the title of a page you wish to bookmark …

Read More »

Phishing scam spreading via Yahoo IM

A phishing scam was circulating on Friday through Yahoo Messenger that directs people to a malicious Web site where they are prompted to enter their Yahoo user name and password. The malicious instant message automatically forwards itself to the victim’s IM contacts. The IM arrives from someone in your contact list with a link to a Geocities Web page and …

Read More »

Warning: Yahoo IM from me is malicious

It finally happened. I fell for one of those silly phishing scams. The kind that I previously took sanctimonious pride in having avoided. The kind where you get a frantic e-mail or IM from a friend saying that a malicious link was clicked, a secret password typed in, and that they didn’t know better. I feel so ashamed, guilty, violated…stupid. …

Read More »

Identify e-mails trying to steal your identity

ATTACK OF THE PHISHERS You open your in-box and find e-mail from eBay or PayPal, warning that your account has been compromised by identity thieves and that you must log on immediately to verify your information. Sounds scary, right? But here’s the really terrifying part: that e-mail is a fake, and so is the Web site it’s sending you to. …

Read More »

Keep Organized Crime out of Your Network

A couple of months ago we looked at the trend toward serious IT security breaches and organized crime’s involvement in those breaches. It’s estimated that the majority of these serious security breaches are coming about because of organized criminal activity – and yes, the Mafia is getting involved. In the original article we covered scams ranging from petty spam threats …

Read More »

10 Tips Security

Keamanan (security) merupakan masalah yang cukup penting dalam era informasi elektronik ini. Berikut ini adalah sepuluh (10) saran untuk meningkatkan keamanan di tempat anda. Gunakan password yang kuat. Paling sedikit gunakan delapan (8) karakter dan menggunakan karakter yang bukan huruf seperti contohnya: j&%9Hx. Jangan menggunakan katakata yang ada di dalam kamus atau merupakan bagian dari nama anda, nama perusahaan, dan …

Read More »

4 Security Technologies Every IT Organization Must Have

When it comes to IT security, most enterprises really have roughly the same issues to deal with. Microsoft is no exception. We spent two years on the Risk Management and Compliance team in The Risk Management and Compliance team is charged with defining, monitoring, and correcting the risk posture of all MMS environments (for both customer-facing services and infrastructure coordination). …

Read More »

Using VPN to Avoid Packet Sniffing

Last week on the free ware review, I wrote about the simplicity of packet sniffing and analyzing with Ethereal. I revealed how easy it was for anyone to tap sensitive data like login information, credit card numbers, social security number, and mission-critical emails traveling on the network. As promised, I will reveal how to actually prevent packet-sniffing software from reading …

Read More »

Protecting Your Data

Introduction to Windows Firewall The introduction of high-speed Internet connectivity has created a powerful and extraordinary computer networking experience. This newfound burst of bandwidth has launched new innovations in information exchange, media access, and other advanced computing experiences. Unfortunately, this technology has also created a very accessible conduit to the internals of your computer. Using these open and available digital …

Read More »