One of the thorniest issues is traveling and maintaining security. Norton has come up with a nice little VPN package that allows for secure surfing while on open networks.
Well, that is the million dollar question, isn’t it? I have seen a lot of accusation and rumor going around, but I have yet to see any substantiating evidence.
You may not know this, but when you use instant messenger, you are essentially chatting with the world. Now, for most topics, who cares. But, if you are chatting about something highly sensitive and private, you could be screwed. That’s because anyone can simply eavesdrop on that conversation. I’m fairly certain that you don’t want that in those circumstances. Let’s look at a few of your options for securing instant messenger conversations.
Well, well, well. What do you know. Mac gains market share and now the malware wars begin. Apple scrambled to push out an update today that removes the most common variants of Flashback and stop automatic execution of Java applets. The threat is very serious as it attempts to mimic actions on websites for passwords. This can fool the user into giving up very sensitive information, which is sent to remote servers. You can simply do a Mac update to obtain the latest fix.
However, if you are already infected, you should utilize Apple’s fix or F-Secure’s Flashback Removal Tool or Symantec Flashback Removal Tool. If you are unsure, do yourself a favor and use those removal tools just to make sure!
A new zero day for the Adobe Reader has been identified. That means that it has no solution as of yet. Adobe is frantically putting together a fix for next week. Here are the verions/systems affected:
- Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh
- Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX
- Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh
- Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh
Here we go again. Someone has found a nasty way to exploit your Windows machine. The vulnerability is currently being exploited by W32.Temphid malware. The issue seems to be in the way that windows parses .lnk shortcut files. Here is M$’s take on it:
“The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut. This vulnerability is most likely to be exploited through removable drives. For systems that have AutoPlay disabled, customers would need to manually browse to the root folder of the removable disk in order for the vulnerability to be exploited. For Windows 7 systems, AutoPlay functionality for removable disks is automatically disabled.”
There is no current patch.
You can, however, disable displaying icons for link files, and kill this potential exploit. via US-Cert:
Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the “Changing Keys And Values” Help topic in Registry Editor (Regedit.exe) or view the “Add and Delete Information in the Registry” and “Edit Registry Data” Help topics in Regedt32.exe.
1. Click Start, click Run, type Regedit in the Open box, and then click OK
2. Locate and then click the following registry key:
3. Click the File menu and select Export
4. In the Export Registry File dialog box, enter LNK_Icon_Backup.reg and click Save
Note This will create a backup of this registry key in the My Documents folder by default
5. Select the value (Default) on the right hand window in the Registy Editor. Press Enter to edit the value of the key. Remove the value, so that the value is blank, and press Enter.
6. Restart explorer.exe or restart the computer.
The Q-See QSC48030 line of video surveillance cameras gives you a robust camera at a very reasonable price. This allows you to nail the bad guys without being robbed by a camera company. It doesn’t stand up to high end video surveillance cameras, but it’s a great buy for the money.