security

Fri
02
Mar
Dennis Faas's picture

SupportSoft Tech Support Tools Leave PCs Vulnerable to Remote Attack

The United States Emergency Readiness Team (US-CERT) has issued an advisory regarding remote tech support tools made by SupportSoft. The affected software uses ActiveX controls contain multiple buffer overflow vulnerabilities which could allow a ... remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The SupportSoft ActiveX controls are essentially small applications that can be run from Microsoft's Internet Explorer. The affected software is often used by Internet service providers, PC makers and other companies to provide support functions such as remote ... (view more)

Thu
08
Feb
Dennis Faas's picture

Ditching a Mac for Vista?

Technology writer Joe Hutsko did what many devoted Mac fans would deem unthinkable: he switched from Mac to Windows at the launch of Vista, and gave the new operating system a shot at earning his loyalties. (Source: osnews.com ) His final decision? ... Well... you're just going to have to read on. ;-) One thing that Hutsko doesn't hesitate to note is Vista's sleek first impression. The start up screen, desktop, icons, and menus all reflect a new sharpness. Even the new font, Segoe UI, impressed Hutsko. The new Aero features are also a nice surprise to the former Mac user. The Flip 3D feature, ... (view more)

Wed
20
Dec
Dennis Faas's picture

A Custom Security Suite that Beats Norton: For Free?

Do you use Norton Security or an "all-in-1" solution to protect your PC? You might not want to after you read this: Infopackets Reader Mike L. writes: " Dear Dennis, My problem is that I'm a relatively naive computer user and have -- for some time ... now -- depended on Norton's 'all in one' security package (firewall / anti-virus / anti-spam) to blanket my PC from Internet nasties. A friend told me that Norton tends to configure a PC to best meet their own specifications, and that this causes periodic corruptions. Can you point me to information about the best way for a less than ... (view more)

Thu
28
Sep
Dennis Faas's picture

'Windows Power Shell', and 'Active Security Monitor'

Windows Power Shell Windows PowerShell is a new task-based command line shell and intuitive scripting language for system administration that provides comprehensive control and automation for Windows administrators. Windows PowerShell allows ... administrators to be more productive by improving the manageability of the Windows operating system and applications that run on Windows. Free from Microsoft. http://www.microsoft.com Active Security Monitor Active Security Monitor scans your computer and provides you with a consolidated overview of your PC security based on the existence of common ... (view more)

Wed
27
Sep
Dennis Faas's picture

Study Suggests Firefox More Vulnerable Than IE

In the tech world, conventional sentiment has always been that Mozilla's Firefox browser is safer and more secure than Microsoft Internet Explorer (IE). Now, antivirus and security company Symantec (Norton) is strongly challenging that notion. A ... recent study by Symantec indicates that 25 confirmed security holes were discovered in Firefox during the first half of 2005 -- "the most of any browser studied," according to the authors of the research. Out of those 25 security defects, 18 were identified as high-risk. Internet Explorer, on the other hand, contained 8 high-level security risks out ... (view more)

Thu
24
Aug
Dennis Faas's picture

Microsoft Hires Former McAfee VP

It's been some time since yours truly or anyone at Infopackets reported on Microsoft security. After a typhoon of activity earlier this summer with the release of OneCare Live and then the controversial Windows Genuine Advantage (WGA), the ... Redmond-based company has remained relatively hush on its plans for protecting itself and its paying customers. However, Microsoft again enters the spotlight with a recent announcement regarding former McAfee veteran, Vincent Gullotto. (Source: hackinthebox.org ) Once dubbed by CNET News to be the industry's "Virus Hunter", Gullotto has in recent years been ... (view more)

Fri
11
Aug
Dennis Faas's picture

Web 2.0: The Next Generation of Thrills and Threats

As might be expected, new horizons bring new threats. As the browser and website world expands, so too do security risks that offer anything from Spyware annoyances and popups to viruses that damn the functionality of the average PC. Recently, ... insiders have revealed that this new generation of Internet technology is growing so fast that it is outpacing the safety of security updates. Web 2.0 is the common term used for websites that offer increased functionality and interactivity beyond simple HTML (no-flash) text. Undoubtedly, many of the pages who proudly describe themselves as proponents ... (view more)

Wed
19
Jul
Dennis Faas's picture

Firewalls: Definition

A firewall is a barrier to keep destructive forces away from your computer. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Firewalls use one or more ... of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved through the firewall and then ... (view more)

Thu
13
Jul
Dennis Faas's picture

MS Excel Security Leaks Becoming Flood

Users of Excel's immensely popular spreadsheets are increasingly having to look over their shoulder. Insiders are today reporting that a new security leak -- for the third this month -- has been discovered within the program. Excel 2000, 2002, 2003 ... and Office 2000, XP and 2003 are all affected, and the fallout is driving accountants into the fetal position. The most recently reported flaw allows attackers to carry out their own commands by convincing a user that a repair is needed on a specific file. Once that file is opened, hackers can do what they wish to an affected users' system. Caught ... (view more)

Thu
06
Jul
Dennis Faas's picture

Kill WGA with the BigFix

I've been hearing a lot of hype about this Windows Genuine Advantage program. I especially liked Brandon Dimmels articles about it here at Infopackets (see "Windows Genuine Advantage (WGA) Under Fire"). I don't like programs that needlessly contact ... their home websites to report on me. Many people call that "Spyware" and I also agree that WGA fits the description. It's taken a little while for me to figure out what to do about WGA. The funny thing to me is that I've had the "Fix" on my PC for a long time. Here's what I've done ... Install BigFix Turn off automatic downloading of Windows ... (view more)

Pages

Subscribe to RSS - security