Rodney Campbell's Blog

2006.10.16 Daily Security Reading

by on Oct.16, 2006, under Security

I’m back! It was an interesting (although very long) trip away – I’m still trying to catch up on all my outstanding emails and other reading…

The future of malware: Trojan horses

Widespread worms, viruses or Trojan horses spammed to millions of mailboxes are typically not a grave concern anymore, security experts said at the Virus Bulletin conference here Thursday. Instead, especially for organizations, targeted Trojan horses have become the nightmare scenario, they said.

ICSA Labs introduces Anti-Spam certification (pdf)

ICSA Labs has announced that it is now accepting anti-spam products for evaluation and certification testing. The goal of ICSA Labs’ anti-spam product testing and certification is to evaluate product effectiveness in detecting and removing spam, as well as how proficiently it recognizes messages from legitimate sources.

Top Malware Threats: Cached malicious code and Web 2.0 platforms

Finjan, the provider of proactive web security solutions for businesses and organizations, has announced its findings on the latest web security trends as uncovered by its Malicious Code Research Center.

Hacking Web 2.0 Applications with Firefox

Some of the methods, tools and tricks to dissect web 2.0 applications.

Here’s what one guy does for fun when a telemarketer calls

From The Bob & Tom Show Radio Program.

Security vs. usability – No one’s winning

Experts say wretched usability is scaring crypto newbies away.

Windows CE is extremely vulnerable, says Kaspersky

Internet security company, Kaspersky Lab, highlights the vulnerabilities of mobile operating systems in the second part of its ‘Mobile Malware Evolution’ report, out today.

Dangerous Terms: A User’s Guide to EULAs

We’ve all seen them – windows that pop up before you install a new piece of software, full of legalese. To complete the install, you have to scroll through 60 screens of dense text and then click an "I Agree" button. Sometimes you don’t even have to scroll through to click the button. Other times, there is no button because merely opening your new gadget means that you’ve "agreed" to the chunk of legalese.

One anti-virus engine is not enough, says GFI

GFI has issued a stark warning to businesses across Europe about the dangers of deploying a single anti-virus engine. GFI’s new white paper, ‘Why one virus engine is not enough, reveals that organizations relying on the protection of a single anti-virus engine are actually leaving themselves exposed to a severe and constant threat from all forms of malware.

The advantages of Distributed Vulnerability Scanning

Organizations with large networks can enhance their vulnerability scanning efforts by deploying multiple Nessus vulnerability scanners. This blog entry discusses the advantages of using multiple scanners for both Nessus users and Security Center operators.

Microsoft’s big patch day fixes 26 flaws

Microsoft released ten patches on Tuesday to plug 26 security holes in its Windows operating system and Office productivity suite, giving 15 of the vulnerabilities its most severe threat rating of "critical."

Prepare for Internet Explorer 7

After one of the most widely tested beta products in Microsoft’s history and trial downloads by millions of users, Internet Explorer 7 Version 1.0 is finally ready. The tentative release date is Oct. 18, followed by Windows Update and Automatic Updates availability on Nov. 2.


Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.