Security Corner:

February, 2009

1

February 28, 2009  4:11 PM

Use This Little Known Tool to Securely Delete Files and Folders on Your Hard Drive

Ken Harthun Ken Harthun Profile: Ken Harthun

For those who grew up with the graphical user interface, command line tools are often seen as arcane remnants from the dawn of PC history, a time when badly-dressed nerds sporting horn-rimmed glasses and pocket protectors ruled the universe (well, maybe just the computer lab). For them, nearly...

February 25, 2009  1:52 AM

Beware the Phone Phishing Scam

Ken Harthun Ken Harthun Profile: Ken Harthun

In my area, there has been a rash of phishing calls targeting bank customers. Coincidentally, today's WXP News (Vol. 8, #59 - Feb 24, 2009 - Issue #367) addresses the same issue:

You might never click a link in an email purporting to be...


February 24, 2009  3:37 AM

Scareware – Yes, People Do Fall for the Ruse

Ken Harthun Ken Harthun Profile: Ken Harthun

What happens when people fall for the scareware ruse and actually install the stuff? Oddly enough, they may not even know they’ve been duped. Their systems may run a little slower, but they may be fooled into thinking they’re now being protected by the malware they’ve installed. What...


February 18, 2009  5:05 PM

Scareware–Using Fear & Deception to Dupe Consumers

Ken Harthun Ken Harthun Profile: Ken Harthun

You're checking out your favorite web sites when out of the blue a scary message appears on your desktop, which may look like the picture below, or it may just be a box that says "Warning! Spyware detected on your computer!"


February 14, 2009  3:54 PM

There is no "Super Secure" Browser

Ken Harthun Ken Harthun Profile: Ken Harthun

Security is a complicated process, leaving many to desire a magic bullet. Unfortunately, there isn't one. No matter how much security developers build into software, the behavior of the person seated in the chair will always be the weak link. Truth be told, all of the major browsers are safer than...


February 11, 2009  10:30 PM

Software for Secure Computing: Easy Email & File Security with AxCrypt

Ken Harthun Ken Harthun Profile: Ken Harthun

Most of the email we send and receive from our co-workers, family, and businesses contains little that requires any degree of confidentiality. The same goes for most of the files we have stored on our hard drives and thumb drives. Occasionally, however, we need to pass on or store some information...


February 10, 2009  3:02 AM

OpenDNS Service to Track and Block Conficker Worm

Ken Harthun Ken Harthun Profile: Ken Harthun

With some estimates placing the number of computers infected by the Conficker worm at 10 million or more, Conficker has the potential to become one of the biggest botnets ever. Given that many system administrators probably don't...


February 3, 2009  3:19 AM

Are Windows PCs Threatened by Malware Harbored on Mac & Linux OS’s?

Ken Harthun Ken Harthun Profile: Ken Harthun

Can Mac and Linux boxes harbor malware that does not affect them, but could affect Windows PCs?  Absolutely. It can and does happen. The Sophos white paper, “Protecting Mac and Linux computers: genuine need or...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: