archives
June 2010

Java: Worse than Adobe and Microsoft for vulnerabilities?

Brian Krebs thinks so: Java is now among the most frequently-attacked programs, and appears to be fast replacing Adobe as the target of choice for automated exploit tools used by criminals. Of the systems which I personally administrate as the ‘Chief Family Technology Officer’, the Java updates constantly annoy and confuse my mom who uses

AMTSOlutely Fabulous or Utter BS?

Kevin Townsend asks whether AMTSO (the Anti-Malware Testing Standards Organization) is “a serious attempt to clean up anti-malware testing; or just a great big con?” I posted a lengthy response to that on the AMTSO blog here…

Pharma Phraud

Spam that advertises Canadian pharmacies makes up a very significant percentage of all the spam out there. Part of the reason there is so much of this spam is that it works. There is a huge incentive driven extensively by the American pharmaceutical industry keeping prices artificially high in America. Many Americans cannot afford the

E3 Opens Tomorrow

The Electronic Entertainment Expo, or E3, opens in Los Angeles on June 15th. There will be a lot of news coming out of this major expo and that means a lot of press. Microsoft, Sony, and Nintendo are all set to announce new games and motion control devices that are certain to attract a lot

Ohhhh Free Money!!!

I received the following email recently: Greetings, Please forgive me for the unofficial way of reaching you via email Contacting you is the only option left to me due to the doctors report on my deteriorating health condition which raised a lot of worries regarding some amount of money i secured in Iraq. For you

Will Free Wi-Fi at Starbucks and McDonalds Spread Malware?

Reports that Starbucks (NASD: SBUX) will be offering free 802.11 wireless access at all US locations starting July 1st raised some speculative eyebrows with this Threat Blogger wondering about whether proliferation of open access points on a brand-name and nationwide basis will spread malware or increase the theft of identity rich account login information often

More on OSX/OpinionSpy

Further information on OSX/OpinionSpy

Mac to the Future

I like Macs. Not in an "OS X is God's own Operating System" sort of way, but I've owned/used many Macs, from SE/30s and IICX's to iMacs, eMacs and Macbooks. In fact, at least two of my books were written on the Powerbook which was my workhorse machine in my last couple of years at

IEEE eCrime Researchers Summit 2010 Call for Papers

The fifth IEEE eCrime Researchers Summit 2010 once again will be held in conjunction with the 2010 APWG General Meeting between October 18-20, 2010 at Southern Methodist University in Dallas, TX. See http://ecrimeresearch.org.

$161.84 to Infect 20,000 Users

In a paper titled “Is the Internet for Porn? An Insight Into the Online Adult Industry”  and presented at The Workshop on the Economics of Information Security conference, researchers spent $161.84 to have approximately 49,000 visitors directed to their adult web sites. As visitors arrived, the research adult web sites would check to see if

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2013 ESET, All Rights Reserved.