Security Corner:


September 21, 2008  2:06 PM

On the Lighter Side of Security

Posted by: Ken Harthun
Humor, Security

Security's a serious subject sometimes causing us to get a bit too deep in concern over the potential and real threats we face. So, today I'm going to lighten it up with a bit of humor. In the sixties and seventies, it was common to see this sign posted in mainframe computer rooms:

September 19, 2008  1:30 AM

Antivirus XP 2008/2009 Malware Up the Ante

Posted by: Ken Harthun
Anti-malware, Anti-virus, Cybercrime, Malware, Virus

According to US-CERT, the cybercriminals who are foisting fake antivirus programs, such as   Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 15, 2008  3:42 AM

Top Five Security Information Resources

Posted by: Ken Harthun

When I discuss security with people who aren't security-focused, they often ask where I get my information. I usually generalize, telling them I subscribe to several security newsletters and check the web frequently. I do that to avoid a long-winded discussion of the whys and wherefores of my...

September 13, 2008  6:32 PM

Software for Secure Computing: Microsoft Malicious Software Removal Tool

Posted by: Ken Harthun
Anti-malware, Anti-virus, IRC bot, Malware, Microsoft Windows, Secure Computing, Security

It's funny how sometimes we take for granted things like Microsoft's Malicious Software Removal Tool (MSRT). That's probably because it doesn't do much to make its presence known. Every month, Microsoft offers MSRT (

September 12, 2008  2:22 AM

Bootable Thumb Drive Virus Scanner Saves the Day

Posted by: Ken Harthun
Anti-malware, Anti-virus, Hacking, Linux, Malware, Security, Trojan

Forgive me if I brag a bit in this post, but I think I earned the right. You be the judge. Last weekend, I noticed strange behavior on my home system. ESET Smart Security kept reporting that it had "found and quarantined m.exe,...

August 31, 2008  9:44 PM

Software for Secure Computing: Personal Firewalls

Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, NAT, Routers, Secure Computing, Security

How to Secure Your Computer: Maxim #2 stressed the importance of using a NAT router to make your network "invisible" to...

August 31, 2008  4:30 PM

CERT Says Linux is Under Attack

Posted by: Ken Harthun
CERT, Cybercrime, Instrusion prevention, Intrusion detection, Linux, Rootkit, Security, Vulnerabilities

It had to happen sooner or later; as Linux gains an ever-increasing foothold (Linux market share to reach 7% in 2008 ) in the market, it will become a viable target for criminal hackers. According to the U.S. Computer Emergency...

August 27, 2008  2:40 AM

Worm Infects International Space Station Laptops

Posted by: Ken Harthun
Opinion, Security, Virus

Houston, we have malware. (Sorry, I had to do that.) Apollo 13 had real live mechanical malfunctions that could have resulted in the mission earning a place in our space program's disaster timeline between...

August 23, 2008  2:39 AM

Oscarbot.UG Eludes Detection with Intelligent Stealth

Posted by: Ken Harthun
Anti-malware, Anti-virus, Cybercrime, Malware, Opinion, Phishing, spam, Virus

According to Panda Security, the Oscarbot.UG virus, first detected on August 17, 2008, uses...

August 21, 2008  1:50 AM

Software for Secure Computing: Keep Your Software up to Date

Posted by: Ken Harthun
Microsoft Windows, Secure Computing, Security, Security management, Vulnerabilities

Though you probably don't think of it as software, Microsoft Windows Update is a web-based application that's a vital part of your secure computing initiative. As recently as last month, I had to clean up a system that had been severely infected with malware. One of the steps in my cleanup process...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: