Did you know that the vast majority of internet attacks nowadays are focused on web applications and web servers in general? Almost any business has an online presence with a website, e-commerce web application, web front with database at the back etc etc. Hackers have found ways to infiltrate internal networks via those web applications […]
[Continue reading]Protect your children on the Internet
Many parents ask how they can protect their children while they surf on the Internet. Recently a mother was worried that her children spend too much time on sites like Orkut, MySpace and Facebook. These concerns were not because of time loss from such activities but mainly because she didn’t know with whom the children […]
[Continue reading]How to Remove the Conficker – Downadup – Kido Worm
The new worm blast that affects almost all Windows versions listens to the name of Conficker or Downadup or Kido. It is estimated that around 50000 computers per hour are being infected with the Conficker worm all over the world. This worm spreads itself by exploiting the Microsoft vulnerability MS08-067. It is a very clever […]
[Continue reading]Adobe Reader and Acrobat JBIG2 Processing Multiple Vulnerabilities
Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF’s. Both Adobe Acrobat and Reader have buffer overflow vulnerabilities while handling JBIG2 streams inside a PDF file. JBIG2 is an image encoding standard for encoding bi-level images. One […]
[Continue reading]Microsoft Buffer Overflow Vulnerability on Graphical Device Interface GDIPlus EMF
There is a Critical Microsoft vulnerability discovered these days affecting almost all windows versions: Description: Graphics Device Interface (GDI) is an application programming interface by Microsoft Windows. It’s a core operating system component responsible for representing graphical objects. Microsoft Windows GDI has integer overflow vulnerability in gdiplus.dll while processing Enhanced Metafile (EMF) files. Possible vectors […]
[Continue reading]Virus Evolution History Part 2 – Melissa and other executable worms
The powerful file interpreter scripts included in Microsoft Office gave to the virus creators an opportunity to be armed with the characteristics of worms. An example of this was Melissa worm, a Word macro virus with the characteristics of a worm, which infected documents created with the 97 and 2000 versions of Word. This worm […]
[Continue reading]Virus Evolution History – Part 1
In this article we will examine how the growth of Windows and Visual Basic affected the evolution of computer viruses, since along with the development of those two technologies we had the appearance of global virus epidemics, like the virus Melissa in 1999. While Windows were evolving as an application designed to facilitate the management […]
[Continue reading]Fujitsu Flepia – The new Kindle
Fujitsu got jealous of Amazon and created the color version of Kindle ! The new product is designed to read newspapers electronically, and is being tested these days by Fujitsu in various cafes in Japan. It is a very thin display device with e-ink technology (electronic ink) that consumes minimal battery energy (50 hours of […]
[Continue reading]Which are the biggest companies in the Antivirus arena
Everyone in the United States has heard of the leading antivirus vendors such as Mcafee, Trend Micro, Symantec, Computer Associates etc. These companies have market-leading presence in the United States. Microsoft, as well, has plans to become a key player in this market. Microsoft acquired intellectual property and technology from GeCad software in 2003, a […]
[Continue reading]Data security on the internet – DES and RSA Encryption
Have you ever wondered what happens when sending personal data via the Internet (eg via e-mail)? When you send your message, this becomes accessible from multiple computers, and a third person could take it and read. Imagine now if the government or military messages could be read by prospective Hackers what would happen. There should […]
[Continue reading]- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 19
- Next Page »