Security Updates and Warnings

Keeping Your Data Safe. Packet Sniffing Explained

Keeping Your Data Safe. Packet Sniffing Explained

With the amount of personal information that people put online and transmit through the Internet, security of how this data is sent is always a cause for concern. Data sent through a network from one computer to another is not sent as one big block of data but in...

Get Rid of Form Spammers with Security Captchas

Get Rid of Form Spammers with Security Captchas

Spammers have reached not just your mailbox but also your inbox. From pre-approved credit cards to lottery entries, your email accounts are bombarded daily by these unwanted messages. If you’re running a website with a form for registration, comments, or just plain...

How Social Engineering Can Steal Your Company Secrets

How Social Engineering Can Steal Your Company Secrets

Companies may install the newest security system to protect their trade secrets, but they will always remain vulnerable when it comes to the person behind the keyboard, manning the phone, or holding the keys. Hackers have known this for years, and along with their...

How to Avoid Online Swindlers

How to Avoid Online Swindlers

The Internet is a complete world in itself and it gives no less pleasure than the real world. Imagine. there are innumerable games to be played and downloaded via various portals. There are so much in terms of videos and movies. Now add to them, a library of...

Fake Antivirus Software Circulating

Fake Antivirus Software Circulating

Public reports indicate an increase in the instances of fake antivirus software. These software applications are malicious code, not legitimate antivirus applications. These instances of malicious code are noted as being distributed through: spam email messages...

Apple Releases iPhone v2.1

Apple Releases iPhone v2.1

Apple has released iPhone v2.1 to address multiple vulnerabilities in Application Sandbox, CoreGraphics, mDNSResponder, Networking, Passcode Lock, and Webkit. These vulnerabilities may allow an attacker to execute arbitrary code, conduct DNS cache poisoning attacks,...

WordPress Releases Version 2.6.2

WordPress Releases Version 2.6.2

WordPress has released version 2.6.2 to address multiple vulnerabilities. These vulnerabilities are due to SQL column truncation and weaknesses in random number generation. Combined, these vulnerabilities may allow an attacker to reset a user's password and possibly...

Google Chrome Update to 0.2.149.29

Google Chrome Update to 0.2.149.29

Google has released Chrome version 0.2.149.29 to address multiple vulnerabilities. The four vulnerabilities are due to the following: 1. a buffer overflow condition in the handling of filenames displayed in the "Save As" dialog 2. a buffer overflow condition in the...

FCC Phishing Scam

FCC Phishing Scam

The Federal Communications Commission (FCC) has released a public notice alerting users of a potential phishing attack. The notice indicates that non-government entities may be using websites to misdirect regulatory fee payers to an illegitimate website in an attempt...

Google Chrome Vulnerability

Google Chrome Vulnerability

A vulnerability that affects the Google Chrome web browser has been identified. This vulnerability is due to a default configuration that allows files to be downloaded without prompting the user. In addition, downloaded files can be opened with a single click, which...