Category: Cybersecurity


  • What is the most important technology every business should understand to make his/her business successful? Sponsored by HP. Every business should understand who, when, how, and why they ought to have a database. This is especially true for access policies. All too liberal policies are the core reason why people need to protect or at…

  • From: customercare@newegg.com Subject: Order Confirmation number: 37679041 Body: Dear Customer, Thank you for ordering from our internet shop. If you paid with a credit card, the charge on your statement will be from name of our shop. This email is to confirm the receipt of your order. Please do not reply as this email was…

  • Not good… Finnish security expert Harri Hursti, together with Black Box Voting, demonstrated that Diebold made misrepresentations to Secretaries of State across the nation when Diebold claimed votes could not be changed on the “memory card” (the credit-card-sized ballot box used by computerized voting machines. A test election was run in Leon County on Tuesday…

  • “We are not afraid….but we have no problem with making money out of those who are”, originally uploaded by megpickard. *sigh* Materialism and capitalism at their best….

  • The things virus writers put to get people to infect thier computers… You think it’s funny? You are stupid idiot!!! I’ll send the attachment to your ISP and then I’ll be watching how you will go to jail, punk!!! Can ya dig it?

  • Got an email with an attachment name “file.pif” which classically indicates a virus, right? The body of the message? Are you a spammer? (I found your email on a spammer website!?!?) It is stuff like this that makes me feel sorry for the people at work who have to answer questions about technical problems. I…

  • Do not download music files: Does your computer seem to be running slower than usual? Well, if you’ve downloaded any music, movie clips, or games in the past 2 months, then your computer may be infected with “AdWare” and “SpyWare”! Advertisers use downloadable music as a vehicle to “legally” add “SpyWare” and “AdWare” to consumer…

  • WORM_BAGLE.J

    There seem to be a ton of computer worm variants hitting the Internet lately. Kudos to those technicians putting in overtime to identify them. My favorite social engineering worm (at the moment) is WORM_BAGLE.J (aka W32/Bagle-J). Dear user of e-mail server “___”, Our antivirus software has detected a large ammount of viruses outgoing from your email account,…

  • Was more than just the virus. Seems several computers were compromised and turned into file sharing hosts. In retaliation for cleaning up that mess, a Distributed Denial of Service attack hit early in the morning. Along the same idea, the Pentagon wants online voting. This surprises me because the technology is not to the point to…