Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

macnewsworld.com

by Erika Morphy

June 25, 2009

The supposedly superior wits of Mac users are no match for the professionally packaged human engineering tactics that virus writers are using these days, Don DeBolt, director of threat research for CA, told MacNewsWorld.

"Anyone using a computer should be paranoid about security, regardless of what operating system they are using," Andrew Storms, director of security operations for nCircle, told MacNewsWorld. "For example, the recent Adobe (Nasdaq: ADBE) security flaws affected Windows, Mac and Linux, and recent Microsoft Office bugs needed to be patched on Windows and Mac. No user can afford to be lulled into a false sense of security because they believe that one OS is always more secure than another," he argued.

scmagazineus.com

by Angela Moscaritolo

June 29, 2009

A Cincinnati man recently agreed to pay $1.9 million to settle charges with the Federal Trade Commission (FTC) for his involvement in a scheme that allegedly tricked more than one million individuals into buying rogue anti-virus products.

James Reno and his company, ByteHosting Internet Services, agreed to pay the money, which represents the gross revenue he obtained from the scam, to settle the FTC charges. According to the FTC, Reno provided much of the technical expertise needed to carry out the "scareware" scheme, which tricked users into believing their computer was infected with viruses and subsequently offered them fake anti-virus products to clear up the infection.

f-secure.com

by F-Secure

July 3, 2009

Charlie Miller, a well-known security researcher who specializes in Mac and iPhone security, yesterday revealed information about a new vulnerability in iPhone that allows remote code execution via SMS.

blog.commtouch.com

July 9, 2009

Sourceforge.net is one of the most well-respected technology download sites on the Internet, as evidenced by its Google page rank of 9 (out of possible 10), and the fact that it is ranked among the top 200 sites according to Alexa. However, recently Sourc

One of Sourceforge's subdomains is a wiki that allows users to add their own relevant content. Apparently some spammers saw this as an opportunity to do some search engine bombing. They filled up pages of the wiki with pornographic keywords, with links to their pornography pages (see screenshot below). The keywords and links are designed to leverage a highly ranked site (e.g. Sourceforge) to provide inbound links to their pornography site, causing it to rank highly in search engines as well.

The Wall Street Journal

by Jessica E. Vascellaro and Ben Worthen

August 7, 2009

Multiple Internet sites, including popular hangouts Twitter and Facebook, were temporarily disrupted Thursday after they were struck by apparently coordinated computer attacks.

Users were unable to access Twitter's Web site for about two hours starting around 9 a.m. EDT. Around the same time, Facebook users saw delays logging in or using the social network. Facebook Inc. and Twitter Inc. were working together with Google Inc. to investigate what happened.

The Register

by Dan Goodin

August 13, 2009

For the past couple weeks, Twitter has come under attacks that besieged it with more traffic than it could handle. Now comes evidence that the microblogging website is being used to feed the very types of infected machines that took it out of commission.

That's the conclusion of Jose Nazario, the manager of security research at Arbor Networks. On Thursday, he stumbled upon a Twitter account that was being used as part of an improvised update server for computers that are part of a botnet.

This is Local London

by Daniel Binns

August 21, 2009

WHIPPS Cross University Hospital has been hit by a "crippling" computer virus, which has knocked out a large proportion of its IT system.

The fault, which first emerged last week, is still being cleared today by staff, but a Whipps spokeswoman said no patient care had been affected by the problem so far. One hospital patient, who did not wish to be named, told the Guardian they had been informed that the virus had "crippled" scores of computers and created havoc for staff.

The Download Blog - Download.com

by Stephen Shankland

August 25, 2009

Google has fixed two high-severity vulnerabilities in the stable version of its Chrome browser that could have let an attacker remotely take over a person's computer.

With one attack on Google's V8 JavaScript engine, malicious JavaScript on a Web site could let an attacker gain access to sensitive data or run arbitrary code on the computer within a Chrome protected area called the sandbox, Google said in a blog post Tuesday. With the other, a page with XML-encoded information could cause a browser tab crash that could let an attacker run arbitrary code within the sandbox.

Yahoo! Tech

by Jordon Robertson

November 9, 2009

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses - the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen. Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught.

f-secure.com

December 10, 2009

Reports have reached us of a fresh SQL injection attack that has compromised many websites. A Google search of the malicious iframes used in the attacks nets over 100,000 hits.

As is typical, the initial iframes lead to HTML pages, which load iframes containing obfuscated JavaScript, which then attempts to exploit the unfortunate visitor.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp
Google