Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

 Title   Date   Author   Host 

F-Secure Weblog

by Threatsolutions

March 27, 2012

Since the public release of Microsoft's MS12-020 bulletin, there have been plenty of attempts to exploit vulnerabilities in the Remote Desktop Protocol (RDP).

Last week, we received a related sample, which turned out to be a tool called "RDPKill by: Mark DePalma" that was designed to kill targeted RDP service. The tool was written with Visual Basic 6.0, and has a simple user interface. We tested it on machines running on Windows XP 32-bit and Windows 7 64-bit.

F-Secure Weblog

by Karmina

April 24, 2012

Rogue AVs have not really taken much attention recently probably because they are no longer boldly screaming in everyone's faces as compared to the time when the most trending topics produce massive amounts of blackhat SEO-poisoning URLs.

So where are they lurking nowadays? They are still using the SEO-poisoning method, of course. They would need to gain some visibility after all. But in addition to the usual compromised domains, they are now happily residing in Tumblr. The screenshot is taken from one of the several rogue-pushing Tumblr accounts...

Security Focus

by Scott Granneman

July 16, 2011

Well, it finally happened. Right before Christmas, I had a little visit from the FBI.

Dave had this to say: "I have spent a considerable amount in the computer underground and have seen many ways in which clever individuals trick unsuspecting users. I don't think most people have a clue just how bad things are." He then offered to come speak to my students about his experiences.

Commtouch Cafe

by Avi Turiel

August 15, 2011

The UPS name is once again being used to spread vast amounts of email-attached malware.

The last week has seen an extraordinary increase - over 5.5 times the average level before the outbreak. The attack closely resembles the large outbreak reported on at the end of March. The graph below illustrates the increase.

F-Secure Weblog

by Sean

August 16, 2012

We rely on a good amount of automation and virtualization in our battle against malware. Our opponents, malware authors, know this and they frequently employ new tactics to avoid being processed by our back end systems.

One particularly prevalent threat is a "banking trojan" called ZeuS. In the past, we've written about a ZeuS variant that might not infect slow computers as a result of aggressive anti-debugging techniques. Well, today we analyzed a recent ZeuS variant and discovered that it checks to see if its environment is "normal" by looking for the presence of an audio card from the Windows Registry.

Personal Liberty Alerts

by Upi - United Press International, Inc.

March 12, 2013

Rent-to-own giant Aaron's is being sued in Georgia and California for allegedly spying on customers, court papers say.

The lawsuits allege that Aaron's franchises installed software on laptops and computers it rented to help it recover equipment that might not be returned. But customers say they were unaware the software existed and that it also allowed the company to steal private information, including passwords, credit card numbers, social security numbers and personal documents, including, at times, intimate photographs.

by Rebecca Herson

April 13, 2011

Malicious Adobe Flash files are making the rounds of some lucky individuals that have been targeted for spearphishing, according to news reports.

Adobe has confirmed that the vulnerability exists in its Flash program, and that the infected files have been distributed (so far) embedded in a Microsoft Word document sent as an email attachment. This is reminiscent of another weakness in Flash that was exploited back in March; however in that case malicious Flash files using a different vulnerability were distributed embedded in Excel files.

F-Secure Weblog

by Mikko

December 26, 2011

Members of the Anonymous collective announced during Christmas that they had broken into

STRATFOR is an organization that gathers open source intelligence for forecasting purposes. They sell their publications via As far as we can tell, Anonymous gained access to a subscriber list stored on, and that list contained unencrypted credit card data. Anonymous has now published two lists of credit card details belonging to people who have subscribed to STRATFOR reports.

October 8, 2012

This sTLD (sponsored Top Level Domain) is designed specifically for the global adult entertainment industry as a trusted brand, globally recognized and extolling responsible and safe behavior.

F-Secure Weblog

by Sean

March 15, 2013

Apple has released update v10.8.3 for OS X Mountain Lion. And as always, it's interesting to read about the security content.

"Impact: Visiting a maliciously crafted website could allow a Java Web Start application to be launched automatically even if the Java plug-in is disabled." Even if the Java plug-in is disabled?


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

[AspSecurity] - learn and discuss Active Server Pages-related Security

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Photo Gallery - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options. Dave's Quick Search Deskbar
Reliable AddThis Social Bookmark Button