Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Recommended Reads – 26 March 2011

by Shanmuga| Tweet This | Google +1 | Facebook | Stumble It | Reddit | Digg | del.icio.us

FireEye Malware Intelligence Lab: An overview of Rustock – “As you might have seen in the news, the largest spam botnet, Rustock, was recently taken down in a collaborated, coordinated way. All parties involved were bound by a sealed federal lawsuit against the John Doe’s involved, but now that the case has been unsealed, it’s time to talk about a few of the details.”

How to turn off Data Execution Prevention (DEP) – 4sysops – “Data Execution Prevention (DEP) is a security feature of the CPU that prevents an application from executing code from a non-executable memory region. This is supposed to prevent buffer overflow attacks from succeeding.”

Java updates may include annoying McAfee scanner – Computerworld – “Windows users who install the latest Java security patches may end up with a little more security than they bargained for, at least that’s the risk they take if they don’t pay close attention to the installation process.”

ConsumerMan: Who’s tracking you online? – “Don’t look now, but you’re being tracked — some might say stalked — whenever you go online. Information about the sites you visit, the things you buy and the topics you search is used to build a detailed profile about you. In most cases, this is done without your knowledge or consent.”

How to stop your boss spying on you at work – How-to – Techworld.com – “Privacy may be dead, but that doesn’t mean you have to enjoy having your every electronic move tracked by your nosy manager.”

Errata Security: A brief introduction to web "certificates" – “The company Comodo is what’s called a “Certificate Authority”. A hacker tricked them into issuing “certificates” for companies like Microsoft and Google. This would allow anybody who could tap the network between you and those websites to decrypt otherwise encrypted traffic. This somebody would have to somebody in-line with the network, like a hacker next to you in a coffee shop, or the Iranian government wiretapping the ISP. This document explains how SSL is protects against such attacks, and how the bogus Comodo certificates defeat those protections.”

Protect your privacy: what happens to your data? – “When criminals obtain your e-mail address, credit card, or Social Security Number, your information enters an underground economy where it’s sold, bought, and (maybe) eventually used in a crime.”

You may also like to read



{ 0 comments… add one now }

Leave a Comment

Previous post:

Next post: