The social media concept has been in full swing ever since the recent Las Vegas PubCon. While the search industry was well aware of its existence, the idea of leveraging social media for promotional reasons was recently acknowledged as a legitimate aspect of SEM campaigns. One of the primary uses for social media outlets (blogs), […]
IBM: Security Attacks Up 50%
Criminal-driven security attacks and emails with viruses increased by 50% in the first half of this year according to a report released by IBM today.
Spyware attacks! Windows Safe Mode is no Longer Safe.
Spyware and viruses are getting craftier. New methods allow them to boot up even when the user attempts to use safe mode; making them extremely hard to remove.
Browser Attacks Replacing Virus Threats
Criminal assaults on users online continue to grow, as thieves attempt to exploit browser vulnerabilities.
Monsters in Meetings – Personal Attacks
Personal attacks hurt people, mar communication, and end creativity. If they become part of a meeting’s culture, they drive the participants into making safe and perhaps useless contributions.
Fresh Fears in Oil Amid Saudi Attacks
Terrorist attacks in Saudi Arabia scared the price of oil futures up 43 cents to 54.63 in early trading for light sweet crude in New York. London felt the same fears as Brent crude climbed 55 cents to $54.56 a barrel.
Phishing Attacks Continue To Increase
A recent security threat report issued by Symantec.com detailed a number of the threats facing computer and Internet users.
How The Bropia Worm Attacks
Currently, MSN Messenger users are under attack from a medium intensity threat called the Bropia F worm.
IBM Security Report: 55 Percent Increase in Network Attacks
Network attacks against critical infrastructure providers such as utilities, telecommunications companies and government agencies surged 55 percent from July to August, according to IBM’s Global Security Intelligence Services.
Detecting Password Attacks on Windows
Why care about Password Attacks
Windows servers and workstations have become a primary target for malicious users. Be it hackers that try to deface a web site, the Warez community in search for “free” FTP server space or just your internal users interested in restricted files. One common thing about them is that the need to break in either via a software vulnerability or by breaking in into a user account. This article focuses on the later scenario, the try to break in into an account. Fortunately, this occurs not only often but is also relatively easy to spot – and the countermeasures are very simple and effective.