Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

f-secure.com

by Sean

December 17, 2010

F-Secure has won AV-Comparatives' Whole Product Dynamic Test for 2010 and received another Advanced+ award - the seventh this year.

We're currently the vendor with the most awards of the highest category given by AV-Comparatives in 2010. The difference between the first two places in the Whole Product Dynamic Test couldn't have been tighter.

f-secure.com

by Sean

December 16, 2010

Google unveiled the Cr-48 notebook last week in a soft launch of their ChromeOS operating system. And this week, naysayers are calling it a waste of time.

Is ChromeOS a waste of time? That depends... ChromeOS may or may not manage to win consumers over to cloud computing, but there definitely could be some useful side-effects from Google's efforts. Is there ever a time when it's more secure to push people into "the cloud"? Yes, there is. When the cloud, and the data, belongs to an organization. After all, the Cr-48 is really nothing more than a Google thin client.

f-secure.com

by Sean

November 28, 2010

Looks like the situation hasn't improved with the Facebook spam we've been tracking since Thursday.

The "This Girl Killed Herself After Dad Posted THIS on her Wall" application, using a URL of http://apps.facebook.com/suicidegirlg, worked its way past the letter M yesterday (suicidegirlm). And today the URL is based on "a dead girl" and is using the letter G as in /adeadgirlg.

f-secure.com

by Sean

November 23, 2010

Stuxnet continues to be a hot topic. Here's an updated set of Questions and Answers on it.

Video from Virus Bulletin 2010 where Symantec researcher Liam O'Murchu demonstrates a proof of concept Stuxnet-like SCADA modification that changes the operation of an air pump.

f-secure.com

by Sean

April 19, 2010

Many Rogue SEO attack sites will only work if the referrer is from a Google query.

If the URL is visited from other source, the potential victim, will be directed away from the scareware. So where is it that the bad guys are currently forwarding non-Google visitors? CNN.com. This video demonstrates with a recent Google trend:

F-Secure Weblog

by Sean

January 26, 2010

Facebook recently published a nice new feature: Reply to this email to comment on this status.

But is it secure? As it turns out, based on our testing, anyone can use the Reply To address, from any e-mail account.

f-secure.com

by Sean

December 17, 2009

There's a 0-Day PDF exploit taking advantage of a vulnerability found in Adobe Reader and Acrobat 9.2 and earlier.

These screenshots demonstrate that when the PDF file is opened in Adobe Acrobat/Reader it attempts to download an executable file. The server has been abused but is currently active. The executable that is downloaded searches for and encrypts certain files and then uploads them to another server. Adobe plans to make an update available on January 12th, 2009 (almost a month from now).

Internet News

by Sean Michael Kerner

July 25, 2005

IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about.

There were 422 newly reported Internet security vulnerabilities in the second quarter of 2005, according to the SANS Institute. The number represents a 20 percent year-over-year and an 11 percent quarterly increase in reported vulnerabilities. SANS' quarterly update of the top 20 list of Internet vulnerabilities, released Monday, identifies the most critical of the 422 that resulted in widespread damage to both enterprise and home users. Six different vendors made the list, including Microsoft, Mozilla, Apple, Real Networks, Computer Associates and Veritas.

internetnews.com

by Sean Michael Kerner

November 22, 2004

New move in virus battle renders banner ads susceptible to MyDoom variant. A chilling turn in the war against viruses appeared over the weekend. It looks like viruses are now being spread unsuspectingly through Web sites via compromised ad servers.

The SANS Institute Internet Storm Center on Saturday reported that a 'high profile UK website' was among those that had been hit. On Sunday, The Register confirmed on a note on its site that, "early on Saturday morning some banner advertising served for The Register by third-party ad serving company Falk AG became infected with the Bofra/IFrame exploit."

F-Secure Weblog

by Secresearch

April 4, 2012

Over the last several weeks, we've been monitoring a rash of ransomware campaigns across Europe, in which messages, supposedly from the local police, are displayed demanding that a fine must be paid in order to unlock the computer.

We wrote about a Finnish language variant last month. Attacks are still quite active according to our statistics. Even when somebody is savvy enough to recognize the message is a fake, the malware's accusations of offensive materials having been discovered on the user's hard drive creates a chilling effect, which has likely prevented some folks from seeking outside help.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp AddThis Social Bookmark Button
Google