Security Corner:

January, 2009

1

January 31, 2009  3:58 PM

Five Essential Steps to Secure Your Home PCs & Network

Ken Harthun Ken Harthun Profile: Ken Harthun

When we buy an appliance, we expect to be able to take it home, take a brief glance at the instructions for setting it up, plug it in and go. For most things, this expectation is fulfilled, even, unfortunately, for the home PC. In fact, once you get a few things plugged into the back of it all you...

January 30, 2009  4:23 AM

“Victim” of Cybercrime Found Searching for Illegal Porn

Ken Harthun Ken Harthun Profile: Ken Harthun

Talk about irony. You get infected by a cybercriminal's illegal bot (Ozdok/Mega-D in this case) which takes a screen shot that shows you searching for illegal underage porn; then, security researchers get hold of some screen shots from the bot's command and control (C&C) server; while going...


January 28, 2009  1:47 AM

Using the Malicious Software Removal Tool (MSRT) from the Command Line

Ken Harthun Ken Harthun Profile: Ken Harthun

In my September 13, 2008 post, "Software for Secure Computing: Microsoft...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 23, 2009  2:15 AM

Will They Ever Learn to Patch?

Ken Harthun Ken Harthun Profile: Ken Harthun

The latest mass infection to hit the Internet is the Win32/Conficker/Downadup Worm, estimated to have already infected between 500,000 and 8.9 million PCs, depending on whose numbers you believe. This is astounding, considering that the worm exploits a vulnerability in Windows that Microsoft


January 18, 2009  1:34 AM

The Great Drive Wiping Controversy Settled at Last

Ken Harthun Ken Harthun Profile: Ken Harthun

How many times do you have to overwrite a hard drive in order to securely wipe it? This question has been at the center of an ongoing controversy for a long time. On the one hand, we've had Peter Gutmann saying it takes 35 passes (Gutmann, P.  (1996) “


January 17, 2009  3:27 AM

Software for Secure Computing: Exploit Prevention Labs Link Scanner

Ken Harthun Ken Harthun Profile: Ken Harthun

With cybercriminals now actively poisoning search results and legitimate websites--unbeknownst to the webmasters--you can't be too careful when clicking on links. Take a look at this video library presented by


January 14, 2009  2:28 AM

Security Resolutions for 2009

Ken Harthun Ken Harthun Profile: Ken Harthun

[caption id="attachment_101" align="aligncenter" width="257" caption=" "]New Year...</p>
			<span class=   Bookmark and Share     0 Comments     RSS Feed     Email a friend


January 7, 2009  3:35 AM

MD5 Hashing Algorithm No Longer Safe

Ken Harthun Ken Harthun Profile: Ken Harthun

Just last week, two German security researchers, Alex Sotirov and Jacob Appelbaum, made a surprising announcement at the Chaos Communication Conference in Berlin: they had created a fraudulent Certificate Authority (CA) that had a valid signature from a root CA, Equifax, one of the oldest. The...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: