Security Corner:

June, 2009

1

June 30, 2009  8:30 PM

Lighten up! Computer Humor of all Sorts



Posted by: Ken Harthun
Humor

June is almost over and none to soon. I'm not one for wishing the time to fly, but in this case, I'm glad it did: It has been a very stressful month. Security can be a tough gig. So, it's time to lighten up a bit with some geeky computer humor I found at...

June 30, 2009  3:19 PM

Panda’s Cloud Antivirus (Beta) is a Winner!



Posted by: Ken Harthun
Anti-malware, Anti-virus, Cloud Computing, Opinion, Panda Security, Software

I've been using Panda Security's free Cloud Antivirus for awhile and I must say I'm impressed. It's there, but you'll never know it unless you look (the little panda icon in the system tray). I rarely get...


June 30, 2009  1:32 AM

Accused Spam King Alan Ralsky Pleads Guilty



Posted by: Ken Harthun
Botnet, Cybercrime, E-mail scam, Scam, spam

Once again, I’m behind on the news. This Security Fix report is almost a week old:

Alan Ralsky, a 64-year-old...


June 29, 2009  7:01 PM

Spam, Phishing, and Malware Related to Recent Celebrity Deaths



Posted by: Ken Harthun
Cybercrime, E-mail scam, Identity Theft, Malware, Phishing, Scam, Social Engineering

Michael Jackson malware? Farrah Fawcett phishing attempts? Billy Mays spam? Ed McMahon notifies you—from the other side of the grave--that you’ve just won the million-dollar Publisher’s Clearinghouse (but you have to send him some money, first)? Yes, expect it. US-CERT is monitoring...


June 24, 2009  5:45 PM

FAA Gives PKWare’s SecureZip Stamp of Approval



Posted by: Ken Harthun
Encryption, InfoSec, Secure Computing, Security

It doesn't surprise me that the inventor of the ZIP file format was recently awarded a large enterprise software license and maintenance agreement from the Federal Aviation Administration (FAA). What does surprise me is that with my network of security news sources, I hadn't heard about this...


June 23, 2009  5:45 PM

Foxit Reader Contains Multiple Vulnerabilities



Posted by: Ken Harthun
Exploits, Foxit Reader, PDF Flaw, Security, Vulnerabilities

According to a U.S. Cert bulletin issued today, my favorite PDF reader, Foxit Reader has multiple security vulnerabilities:

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 18, 2009  9:29 PM

How to Use the Windows Registry for Cyber Forensics: Part 2



Posted by: Ken Harthun
Cyber Forensics, Cybercrime, Encryption, Hacking, Intrusion detection

In Part 1 of this series, I introduced you to the concept of date/time coincidence and we explored five registry keys that are useful to the forensic examiner. This time, I'll show you how data can be encrypted and hidden in the registry. If you're involved in data security, you're familiar with...


June 5, 2009  8:50 PM

“14 Golden Rules of Computer Security” Nearing Completion



Posted by: Ken Harthun
eBook, Secure Computing, Security

My new eBook, "14 Golden Rules of Computer Security" is almost complete and will be ready for downloading shortly. Written with the non-technical person in mind, the book is packed with proven, practical advice on how to stay safe on the Wild, Wild Web including bonus articles about creating...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: