We have already emphasized enough on the importance of updates for computers regularly, in our previous articles. However, in the past few months the number of updates have been growing oddly burdensome to the average user. The number has grown to such extent that keeping up with the updates is turning into a second job. The Patch Tuesday is no more significant as you may expect a critical… Continue reading
A person may be using a genuine operating system, applications and of course a world class antivirus software – all of them purchased for few thousands of rupees or hundreds of dollars and nothing for free. But still he is not 100% safe in the wild west of Internet today. Because it is not just virus, trojan or any such malware – it is social engineering.… Continue reading
Today almost every user browsing Internet is at risk. The increase in threats related to social networking sites, banking security, botnets, and attacks targeting users, businesses, and even applications made Internet a risky landscape. Many industry consultants and analysts refer Internet as ‘Wild West’ because of its huge insecurity, where nobody or no website can be trusted. Every year, cyber crime costs billions of dollars to repair systems… Continue reading
Many new and sophisticated threats are spreading fast online that can infect your computer. IBM calls the Internet as ‘Wild West’. Risks have increased exponentially. According to its X-Force 2009 Mid-Year Trend and Risk Report, the problem is no longer limited to virus or malicious domains or suspicious websites. There has been increase in the presence of malicious content on trusted sites, including popular search engines, blogs, bulletin… Continue reading
The major factor that makes Microsoft win over Linux or Unix in OS wars, is its ease in usability. Windows has made operating computer an easy thing even for a non-techie. The reason why we still bear the vulnerabilities in Windows and Microsoft’s overwhelming patches without complaining, is definitely that you cannot get an alternative for an easily operatable OS as Windows.
However, after Windows XP… Continue reading
Displaying the information which is useful for your friends to search you online is equally important to limiting the visibility of the information which is more personal, which let the hackers hack your page quiet easily. Following are the few tips which helps you to make you profile page of Facebook more secured.
Besides, all the privacy… Continue reading
In the security bulletin released on 12 May 2011, Adobe announced to have fixed critical Flash player bugs of version 10.2.159.1 and earlier for Windows, Macintosh, Linux and Solaris, 10.2.154.28 and earlier for Chrome and 10.2.157.51 and earlier versions for Android. These vulnerabilities could cause the application to crash and also potentially allow an attacker to take control of the affected system.
Adobe also reported to… Continue reading
As expected, Google released its new version v11.0.696.68, after the claims from VUPEN security researchers to have pwned Chrome. The new version of Chrome comes with the updated Adobe Flash Player 10.3.
As a reply to the claims on pwn of Chrome, security researcher Dan Kaminksy said that if VUPEN used vulnerability in Flash to bypass sandbox, then it is not the Chrome hack… Continue reading
The most secure features of Google Chrome, including Sandbox, ASLR and DEP, were simply bypassed by VUPEN security researchers. The vulnerability is for the most latest version of Google Chrome (v11.0.696.65) for Windows.
The vulnerability is found to be impacting all Windows based computers running 32 bit as well as 64 bit OS. The vulnerability was exploited by just making the user visit a… Continue reading
A recent report from Websense shows the alarming rate of increase in cyber crime activity in Canada. While US still stands as the major hub of hosting phishing websites, Canada occupies second place followed by Egypt. Comparing with the Opendns report published recently on top countries hosting phishing websites in 2010, Germany falls back to forth position from second.
The following are top countries… Continue reading
On contrary to the gigantic updates on the previous Patch Tuesday, Microsoft has released only 2 critical updates this month – one of the lightest Patch Tuesdays in recent years.
What seems interesting here is the fix for Windows Internet Name Service, which allows the NETBIOS devices to communicate on the network. As per the bulletin MS11-035, the flaw in WINS (Windows Internet Name Service) enables… Continue reading
A new mutation of ransomware, which asks for reactivation of Windows, has been reported by F-secure. The user gets a blue screen, saying that the Windows license has been locked. The message screen exactly looks like the Windows screen during installation of OS. There is even a Windows logo on the top-right corner of the screen, to make the message look authentic.
The mutation of malware is happening very rapidly where new types of techniques are evolving to raise money for hackers. Ransomware is a mutation of scareware, where the hacker hijacks a PC by encrypting all its files and demands ransom to unlock or decrypt the files. The infected PC may not send spam mails or track sensitive information for its creator. It is worse than that.… Continue reading