Security Corner:

August, 2008

1

August 31, 2008  9:44 PM

Software for Secure Computing: Personal Firewalls



Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, NAT, Routers, Secure Computing, Security

How to Secure Your Computer: Maxim #2 stressed the importance of using a NAT router to make your network "invisible" to...

August 31, 2008  4:30 PM

CERT Says Linux is Under Attack



Posted by: Ken Harthun
CERT, Cybercrime, Instrusion prevention, Intrusion detection, Linux, Rootkit, Security, Vulnerabilities

It had to happen sooner or later; as Linux gains an ever-increasing foothold (Linux market share to reach 7% in 2008 ) in the market, it will become a viable target for criminal hackers. According to the U.S. Computer Emergency...


August 27, 2008  2:40 AM

Worm Infects International Space Station Laptops



Posted by: Ken Harthun
Opinion, Security, Virus

Houston, we have malware. (Sorry, I had to do that.) Apollo 13 had real live mechanical malfunctions that could have resulted in the mission earning a place in our space program's disaster timeline between...


August 23, 2008  2:39 AM

Oscarbot.UG Eludes Detection with Intelligent Stealth



Posted by: Ken Harthun
Anti-malware, Anti-virus, Cybercrime, Malware, Opinion, Phishing, spam, Virus

According to Panda Security, the Oscarbot.UG virus, first detected on August 17, 2008, uses...


August 21, 2008  1:50 AM

Software for Secure Computing: Keep Your Software up to Date



Posted by: Ken Harthun
Microsoft Windows, Secure Computing, Security, Security management, Vulnerabilities

Though you probably don't think of it as software, Microsoft Windows Update is a web-based application that's a vital part of your secure computing initiative. As recently as last month, I had to clean up a system that had been severely infected with malware. One of the steps in my cleanup process...


August 11, 2008  3:42 PM

The Best Way to Avoid Spam



Posted by: Ken Harthun
email, Secure Computing, Security, spam

In the 1986 hit movie, The Karate Kid - Part II, the kid's instructor, Mr. Miyagi, uttered this famous line: "Best way to avoid punch, no be there!" Good advice, indeed; it's one of those universal pieces of truth that's so obvious, it's overlooked. The beauty of it is that it can be...


August 8, 2008  3:44 AM

Software for Secure Computing: Secure Browsers



Posted by: Ken Harthun
Browsers, Firefox, Internet Explorer, Microsoft Windows, Secure Computing, Security

Two of the biggest mistakes Microsoft ever made were tying Internet Explorer into the Windows OS and ActiveX. Exploits took advantage of both and some of the nastiest malware ever written entered millions of PCs through these...


August 5, 2008  1:01 AM

New Article Series: Software for Secure Computing



Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, HIPS, Intrusion detection, Secure Computing

I recently posted the last article in my How to Secure Your Computer series of security maxims (an eBook will be available shortly--stay tuned for details). While editing the book, I...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: