For years, security vendors have warned users to be careful about unsolicited emails. Clicking on embedded links in these emails, they say, could be dangerous, as could opening attachments that come with them. That includes emails purporting to be from couriers such as DHL and UPS, which could in fa...
Twitter was hit by what's called an "onMouseOver" attack this week that affected thousands of users. The attack exploited a security flaw in Twitter, Bob Lord, a member of the site's security team, wrote on the company's blog. Users dubbed the hole the "onMouseOver" flaw because the first attack tur...
As the 2010 Winter Olympics kick off, the games are on everyone's radar, including the cybercriminals who are looking to capitalize on this world event. Spam campaigns featuring breaking news stories filter through to in-boxes faster than ever before, as automated scripts scrape headlines and the te...
As the frequent news reports of data breaches attest, maintaining data security is a tough row to hoe -- even for large enterprises. It's even harder for small and medium-sized businesses, which don't have the money or IT resources their larger counterparts have. The plethora of threats is daunting,...
With the political election season ramping up, spammers are again using news headlines about the candidates to saturate in-boxes. Researchers have uncovered two new spam clusters with subject lines relating to Barack Obama. At certain points, one of these spam runs accounted for up to 18 percent of ...
A federal court has awarded MySpace nearly $230 million in its suit against Sanford Wallace and his partner Walter Rines -- aka the "Spam King." The judgment -- especially given the size of the award -- represents a decided victory for e-commerce sites in their costly battle against spam. This is th...
Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...
The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops. That said, IT security and control firm Sophos recently issued a warning about potential virus infections targeting Linu...
The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...
For the second time this year, hackers have victimized the University of Missouri. The names and Social Security numbers of 22,396 current or former students who were employed by UM during 2004 may have been compromised, according to university officials. The hacker or hackers reportedly gained acce...
I prefer to buy from my country or countries that mostly align with my principles.
I consider the country of origin, but price and quality are more important.
The country of origin has no influence on my buying habits.
Enter your Username and Password to sign in.