Latest Articles

Categories: Vulnerabilities

[img_assist|nid=4935|title=|desc=|link=none|align=left|width=100|height=100]Version 3.4.8 of the free Samba file and print server fixes various holes
including two denial of service (DoS) vulnerabilities which allow
attackers to remotely crash the Smbd service. Read the full article. [The H Security]

Read more...

Categories: Malware

[img_assist|nid=4936|title=|desc=|link=none|align=right|width=100|height=100]There is a new point-and-click tool circulating online that enables virtually anyone to create a piece of malware that will connect a PC to a budding Twitter botnet.

Read more...

[img_assist|nid=4941|title=|desc=|link=none|align=left|width=100|height=100]The cybercriminals behind the intensifying phishing scam that has
been plaguing Twitter since late last week are proving how easy it is to
pervert the trust social networks like Twitter and Facebook along with
search giant Google have made a cornerstone of their respective business
models. The idea is to get Web users accustomed to using their Twitter, or
Gmail or Facebook credentials as  a “single sign-on” to access the Web’s
coolest apps. Read the full article. [The Last Watchdog]

Read more...

Categories: Slideshow

Under the Programs tab,
you can specify your default applications for viewing web sites, email
messages, HTML editing and various other network related tasks. You can also
disable Internet Explorer from asking you if you would like it to be your
default web browser here.

See more information on securing web browsers at the US-CERT web site.

Read more...

Categories: Slideshow

Internationalized Domain Names (IDN)
can be abused to allow spoofing of web page addresses. This can allow phishing
attacks to be more convincing.  To protect against IDN spoofing in
Internet Explorer, enable the Always show encoded addresses option.
This will cause IDN addresses to be displayed in an encoded form in the
Internet Explorer address bar and status bar, which will remove the visual
similarity to the spoofing target address.  

Read more...

Categories: Slideshow

The Advanced tab
contains settings that apply to all of the security zones. We recommend that
you disable the Enable third-party browser extensions option.
This option includes toolbars and Browser Helper Objects (BHOs). While some
add-ons can be useful, they also have the ability to violate your privacy. For
example, a browser add-on may monitor your web browsing habits, or even change
the contents of web pages in an attempt to gather personal information.

Read more...

Categories: Slideshow

Alternatively, if you do not wish to
receive warning dialogs when a site attempts to set a cookie, you can use Internet
Explorer’s pre-set privacy rules. Click the Default button and
then drag the slider up to High. Note that some web sites may fail
to function properly with the High setting. In such cases, you
may add the site to the list of sites for which cookies are allowed, as
described previously.

Read more...

Categories: Slideshow

By selecting the Sites… button,
you can manage the cookie settings for specific sites. You can add or remove
sites, and you can change the current settings for existing sites. The bottom
section of this window will specify the domain of the site and the action to
take when that site wants to place a cookie on your machine. You can use the
upper section of this window to change these settings.

Read more...

Categories: Slideshow

You can then evaluate the
originating site, whether you wish to accept or deny the cookie, and what
action to take (allow or block, with the option to remember the decision for
all future cookies from that web site). For example, if visiting a web site
causes a cookie prompt from a web domain that is associated with advertising,
you may wish to click Block Cookie to prevent that domain from
being able to set cookies on your computer, for privacy reasons.

Read more...