Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

IT Examiner

by Nick Farrell in Rome

March 18, 2009

A row has broken out over whether the BBC broke the law by using licence payer money to buy a 20,000 strong botnet.

Sophos' Graeme Cluely penned a piece of bile against Click after it ran a story about how easy it is to run a botnet. The BBC incorrectly believed that it was not breaking the law if did not have criminal intent and was just trying to raise public awareness.

computerweekly.com

by Rebecca Thomson

March 27, 2009

The Conficker computer virus, which has been public knowledge since last October, has been sent to computers of MPs and members of the House of Lords.

On 1 April, Channel 4 news reported that the creator of the virus will take control of the infected computers. The virus, a type of worm, can be used to perform any number of functions. Most large companies have anti-virus systems that update daily, and that have been configured to protect their networks and computers against this particular virus.

eblogs.baltimoresun.com

by David Zeiler

March 28, 2009

Mac susceptibility to malware is not as black-and-white as many people believe. Apple haters celebrated Miller's feat; Safari was the first browser to fall in last week's contest. (Internet Explorer 8 and Firefox also were breached, but Google's Chrome wa

Meanwhile, the Mac community mostly jeered, noting Miller had prepared his exploit in the weeks before the contest. Although true, it doesn't change the fact he discovered a valid hole in Safari's code. Mac users should be less critical and more concerned. I know the notion of Mac vulnerability is unpopular, but Miller makes convincing arguments. And unlike vendors of anti-virus software, Miller and the company he works for...have nothing to gain.

InfoWorld

by Roger A. Grimes

March 28, 2009

The results of the CanSecWest 2009 PWN2OWN hacking contest are in. And guess what? The hackers won, and the browsers lost -- the lone exception being Google Chrome.

Hackers successfully compromised fully patched Firefox, Internet Explorer, and Safari browsers, all using exploits that required the local user to load a malicious Web site. Today, that's how 99.999 percent of exploits happen. Google's Chrome was the only browser the hackers did not break. Dr. Miller said that he had Chrome exploits but couldn't leverage the exploits into something useful.

InformationWeek

by Thomas Claburn

March 29, 2009

Proof-of-concept exploit code has been posted online for six kernel vulnerabilities, five of which affect Mac OS X 10.5.6, the most current version of Apple's operating system software.

The vulnerabilities were discussed at CanSecWest 2009 last week during a talk about security flaws in the FreeBSD, Mac OS X, and Solaris kernels by security researchers Christer Oberg and Neil Kettle of Convergent Network Solutions. The five that affect Mac OS X, which uses the Mach kernel and incorporates portions of FreeBSD Unix, remain unpatched.

BBC News (UK)

April 1, 2009

The chaos predicted by some as the Conficker worm updates itself have so far failed to materialise.

There had been concerns that the worm could trigger poisoned machines to access personal files, send spam, clog networks or crash sites.

blog.twitter.com

April 12, 2009

The worm introduced to Twitter this weekend was similar to the famous Samy worm which spread across the popular MySpace social-networking site a while back.

Twitter asserts that no passwords, phone numbers, or other sensitive information was compromised as part of the attacks, but the attackers were able to continue a series of bombardments across 3 days.

abcnews.go.com

by ABC News

April 16, 2009

17-year-old Michael Mooney, who was behind the recent Twitter worms offered a job after claiming responsibility: A black mark or the ultimate resume? Some young programmers hack to get noticed.

For the social networking darling Twitter, it was a headache and potential threat. But for the young man behind the computer worm that attacked the micro-blogging site this week, it was a fast track to a job. Called both "Mikeyy" and "StalkDaily," the pesky computer program crashed the tweet-fest for the first time over the weekend, leaving thousands of unwanted messages in its wake.

f-secure.com

April 16, 2009

Searching for good things with bad results is something that now happens on a regular basis. But now it's personal - searching for "f-secure" leads to rogue products.

A demonstration of how searching for security software may provide ads for malware.

eweek.com

by Brian Prince

April 16, 2009

A Trojan infecting users of pirated Mac software built a botnet used in a denial-of-service attack.

The malware that infected the bots, known as OSX.Iservice, installs a backdoor on infected systems and begins contacting other hosts for commands. Hidden in the pirated software, the malware infects users sharing the files over peer-to-peer networks.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp
Google