Legal Software More Annoying than Most Viruses – Google continues to top the list

From Bill of WinPatrol Blog (Bits from Bill) : Do you remember programs from Gator, MyWaySearch, Net.Net or 180Solutions? Are there still programs running on your computer that you really don’t want?  You’re not alone! Most annoying programs now come from legitimate companies who know they’re not really adding value but do it to make share holders happy. There’s always been competition by companies to get their programs installed on the greatest number of computers.  When you notice your computer keeps getting slower you can blame it on these programs.  At least when AOL shipped out millions of CD’s you … Continue reading Legal Software More Annoying than Most Viruses – Google continues to top the list

Chinese Phishers Get On the Fake Codec Bandwagon

From Webroot Threat Blog: Malware distributors in China have started pushing the same kinds of fake codec scams on unsuspecting Chinese Web surfers that criminals elsewhere in the world have mastered. I’m not sure how I feel about this. On the one hand, I feel sorry for the Chinese victims, most of whom are probably blissfully unaware of the dangers they now face on the Web. On the other, perhaps this will finally serve as a wake up call to Chinese authorities that they need to do something about homegrown Sino-cybercrime. In the course of investigating some odd-looking URLs (including … Continue reading Chinese Phishers Get On the Fake Codec Bandwagon

Privacy problems persist in latest Windows Messenger 2011 beta

Earlier versions of Messenger played fast and loose with your privacy. The new Live Messenger 2011, currently in beta, suffers from some of the same defects Microsoft’s cavalier attitude toward privacy in the Windows Live Essentials applications has drawn the ire of many. Several of your users are probably downloading and trying the new beta versions of Windows Live Messenger, Photo Gallery, Mail, Live Sync, and Writer, collectively known as the Windows Live Essentials 2011 beta. They might expect that the new privacy setting screen — prominently offering an option to keep their information private — would protect them from … Continue reading Privacy problems persist in latest Windows Messenger 2011 beta

SSL Certificates In Use Today Aren’t All Valid

It should be no surprise that the SSL security certificate business is big business, considering how SSL certificates are seen as being on the frontlines of securing Web transactions against fraud. But new data suggests that SSL certificates are not all being configured correctly. Security research firm Qualys is attempting to paint a detailed picture of SSL deployments and their shortcomings with a new, still under-development study that aims to deliver a deeper degree of information on the state of the SSL marketplace than what is currently known. Most industry intelligence on the subject thus far has come from Netcraft … Continue reading SSL Certificates In Use Today Aren’t All Valid

Microsoft’s Windows 8 goals revealed – Fast-boot slate, cloud services

Microsoft’s successor to Windows 7 is taking shape – and that shape looks suspiciously like an iPad supplementing a diet of media with online services. A set of Microsoft slides, apparently leaked online here and expanded here, have mapped out the company’s design and feature goals for Windows 8. Among those goals: Windows 8 works on a slate form factor in addition to the regular laptop and "all-in-one" PC, with Windows 8 complementing this new form factor by providing instant power on – or at least near instant. Windows 8 slates will support touch and use facial recognition to pull … Continue reading Microsoft’s Windows 8 goals revealed – Fast-boot slate, cloud services

If the DHS Is Serving Malware, Should It Be Our Internet Cop?

If you were looking for a company to take charge of the security on your own systems, would you trust one that was serving malware from its own Web site? Me neither. But some U.S. senators want to put the Department of Homeland Security in charge of Internet security for the most important private computing infrastructure in the country. In a pure coincidence as I was writing this story, I stumbled on a page on the dhs.gov site with code injection in it. http://www.pcmag.com/article2/0,2817,2365796,00.asp

Rancid IE6 ‘more secure’ than Chrome and Opera US bank says

Microsoft’s creaking Internet Explorer 6 is more secure and popular than either Google’s Chrome or Opera US banking giant Chase has determined. The bank’s therefore decided its online baking services will continue to support aging the IE 6 but drop support for Chrome and Opera. IE 6 is nine years old and even Microsoft is now desperately speaking out against the browser, to get individuals and businesses to move on to IE 8. Micosoft’s Australian business unit recently equated using IE 6 to being as risky as drinking – or maybe, eating – a carton of nine-year-old milk as it … Continue reading Rancid IE6 ‘more secure’ than Chrome and Opera US bank says

Social networks leak your information, study says

Think only your social network knows your location? Well, think again Well, your favorite social networking sites might be spilling the beans about your location. A study out this week from Worcester Polytechnic Institute (WPI) in Massachusetts shows that mobile social networks are giving data about users’ physical locations to tracking sites and other social networking services. Researchers reported that all 20 sites that were studied leaked some kind of private information to third-party tracking sites. "This initial look at mobile online social networks raises some serious concerns, but there is more work to be done," said Craig Wills, professor … Continue reading Social networks leak your information, study says

White House Cybersecurity Czar Unveils National Strategy For Trusted Online Identity

The White House has outlined a national strategy for trusted digital identities that could ultimately eliminate the username-and-password model and lay the groundwork for a nationwide federated identity infrastructure. Howard Schmidt, cybersecurity coordinator and special assistant to the president, unveiled the administration’s strategy for what he called an identity "ecosystem" for users and organizations to conduct online transactions securely and privately such that identities of all parties are trusted. "For example, no longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services. Through the strategy we seek to … Continue reading White House Cybersecurity Czar Unveils National Strategy For Trusted Online Identity

Spanish firm raided in logic-bomb backdoor probe

Auto-fail programming alleged Three managers at an unnamed Spanish software developer have been arrested over allegations they planted ‘logic bombs’ in software that meant clients were obliged to pay for disruptive repairs and extended maintenance contracts. The Guardia Civil said that more than 1,000 clients of the Andalucia-based developer were affected by the scam since 1998. The unnamed firm sold marketed custom software to small and medium-sized businesses with built-in errors such that it was guaranteed to fail at a predetermined date. These errors would "paralyse the normal functioning of businesses" and oblige customers to contact their supplier, who would … Continue reading Spanish firm raided in logic-bomb backdoor probe