Sort News:
Backyard
Feeds 
- Use RSS for your newsreader and JSS (javascript) for an existing blog:
- RSS: Wire & Vine
- RSS: Wire
- RSS: Vine
- JSS: Wire & Vine
- JSS: Wire
- JSS: Vine

Malware Responses: What To Do Before, During, And After An Attack Don't let a malware attack ruin your business. A little planning and the right responses can make it a minor annoyance instead of a major catastrophe. By Ross M. Greenberg TechWeb.com
Security threats to PCs with Microsoft Windows have increased so much that computer users should consider using a Mac, says a leading security firm. Sophos security said that the 10 most commonly found pieces of malicious software all targeted Windows machines.
Symantec is warning that it has detected a new piece of malware that tries to exploit a flaw in Mac OS X systems that Apple released a patch to fix just two days ago.
A security researcher with expertise in rootkits has created a working prototype of new technology that is capable of creating malware that remains "100 percent undetectable," even on Windows Vista x64 systems.
Over the last few days an advertiser used an ad to install the ErrorSafe malware that tried to trick people into believing they had a fault on the computer that needs them to purchase a fix.
"The sheer volume of IM attacks is a dramatic demonstration that we're in an environment where hackers, knowing that most organizations are still unprotected against IM malware, are rapidly adopting IM for their attacks," said Andrew Lochart, senior director of marketing for Pos …
The identities included Social Security numbers, names, and addresses, and were transmitted to an unknown hacker by the keylogging Trojan horse that was on a PC in the state agency where the employee has been working.
More than 60 percent of compromised PCs scanned by Microsoft were found to be running malicious bot software
There's been a lot of talk about how iPods and other portable devices pose a security risk to companies, as employees may store important company documents of them. Now there's fear that such devices could upload malware and infect corporate systems.
Instant messaging, the quicker-than-e-mail alternative for online communication, is moving rapidly from teenagers' bedrooms to mainstream America.
"He lumped the thing back to Microsoft's headquarters and turned it over to a team of top engineers, who spent several days on the machine, finding it infected with more than 100 pieces of malware, some of which were nearly impossible to eradicate."
Malware threatens to delete files unless payment is sent via Western Union.
This article details the musings of Konstantin Sapronov, a virus analyst and Kaspersky Labs. He notes 100% increase in 2005 of malicious threats against Linux and predicts that the Mac platform is next.
New York state's pugilistic Attorney General has spyware in his sights.
The New York State attorney general sued another Internet pop-up advertising company Tuesday, accusing it of secretly installing malicious programs on personal computers...
I'm switching my crappie Windows server at home to a Mac Mini, and I've already dumped my previous Windows laptop in favor of a Powerbook. That leaves only 1 Windows machine to go.
Excerpts from BBC News stories lure Internet Explorer users to malware download sites.
A Russian website is selling a DIY spyware kit, called WebAttacker, for around $15 a throw. The site, which proudly boasts of its creator's credentials in the scumware industry, also offer technical supporter to potential buyers.
Some may remember Sony BMG's mistake of putting rootkit technology on people's computers without the users knowledge even if he or she reads or rejects the terms and conditions.
Brazilian mega-star Marisa Monte's new CDs from EMI ("Infinito Particular" and "Universo ao Meu Redor") come with DRM that can't be uninstalled, and requires you to "agree" to a contract that isn't published in Portuguese. Even if you disagree, the malware is installed.
Maybe they have a point in blowing the proverbial whistle this early but coming from a week-long information security training, I learned that the scenario they have enumerated is indeed possible. Hopefully something's being done to prevent any future RFID-based malware.
This may be just plain old F.U.D. but it pays to be careful. As always, never open attachments and keep your browsers off those "shady" websites. I just hope my Windows-using friends and colleagues doesn't get hit by this.
Agent trojan called W32/Agent.ULL downloads and plays child porn movie while installing malware related to scam anti-spyware packages Spysheriff and BraveSentry, says Norman Data Defense Systems of the U.K.