Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

 Title   Date   Author   Host 

Heise Security

October 9, 2006

The Swiss Department of the Environment, Transport, Energy and Communications (UVEK) is examining the use of spy software to allow it to listen in on conversations on PCs.

The software comes from Swiss security company ERA IT Solutions, which intends to supply it solely to investigation agencies. This should also prevent antivirus manufacturers from incorporating it into their databases and having their tools recognise it. According to the manufacturer, firewalls do not present a problem.


August 31, 2006

A vulnerability has been discovered in Sony PlayStation Portable, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error in libTIFF and can be exploited to execute arbitrary code when a specially crafted TIFF image is viewed in the Photo Viewer. The vulnerability has been confirmed in version 2.60 and has also been reported in versions 2.00 through 2.80.

Seattle Post Intelligencer (WA)

by Mike Barber

August 25, 2006

A 20-year-old California hacker who created a virus that jeopardized patients at Northwest Hospital in Seattle, damaged computers at U.S. military installations worldwide and affected thousands of others will be sentenced today.

Federal prosecutors will ask U.S. District Judge Marsha Pechman to send Christopher Maxwell to prison for six years. Maxwell's lawyer will argue that only probation and community service is warranted, according to court documents. Defense attorney Steven Bauer cites Maxwell's lack of a criminal record.

Information Week

by Sharon Gaudin

August 25, 2006

The key indicator is a repeat "problem child" who continually argues with fellow employees, complains about salary or benefits, or is otherwise aggressive or hostile.

Brian Robak, a network security analyst at National Cooperative Bank, used to manage the company's help desk workers back when he was the LAN manager. Being a manager is never an easy chore, but there was one employee who generally made his job a nightmare. A full 80% of people who launch a computer-related attack on their own company's system had been problem employees, according to the Secret Service.

New York Times

by John Markoff

August 11, 2006

The flaw would make it possible to install malicious programs or to change or delete data.

The Department of Homeland Security issued an unusual security alert yesterday, warning users of Windows-based personal computers to patch a flaw in the Microsoft operating system. On Tuesday, Microsoft issued its monthly list of security flaws, including one that the company rated "critical."

by Kevin McLaughlin

August 9, 2006

In the never-ending cat-and-mouse game between hackers and those charged with stopping them, it's pretty clear who's winning--and it's not the cat.

Speaking at the Black Hat conference in Las Vegas last week, Kevin Mandia, president of Mandiant, an Alexandria, Va.-based security consultancy, said attackers are using increasingly sophisticated methods to evade detection and make life difficult for security incident response teams. The sophistication of hackers' tools is outpacing that of investigators' forensic tools, and one of the consequences is that incident response teams charged with investigating attacks on networks are taking between 5 and 8 days to find malicious code, Mandia said. "Malware analysis can be time consuming, and most firms don't want to spend the money to fully analyze the malicious code, which could cause further damage [to the network]," said Mandia.

by SPI Labs

July 27, 2006

Imagine visiting a blog on a social site like or checking your email on a portal like Yahoo Webmail. While you are reading the Web page JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects

This scenario is no longer one of fiction.

Washington Post Blog

by Brian Krebs

July 19, 2006

Hacked Ad Seen on MySpace Served Spyware to a Million An online banner advertisement that ran on and other sites over the past week used a Windows security flaw to infect more than a million users with spyware when people merely browsed the si

Michael La Pilla, an iDefense "malcode" analyst, said he first spotted the attack Sunday while browsing MySpace on a Linux-based machine. When he browsed a page headed with an ad for, his browser asked him whether he wanted to open a file called exp.wmf. Microsoft released a patch in January to fix a serious security flaw in the way Windows renders WMF (Windows Metafile) images, and online criminal groups have been using the flaw to install adware, keystroke loggers and all manner of invasive software for the past seven months. The Deckoutyourdeck ad launching the WMF exploit.


July 13, 2006

One core Debian server has been reinstalled after a compromise and services have been restored. On July 12th the host has been compromised using a local root vulnerability in the Linux kernel. The intruder had access to the server using a

At least one developer account has been compromised a while ago and has been used by an attacker to gain access to the Debian server. A recently discovered local root vulnerability in the Linux kernel has then been used to gain root access to the machine. At 02:43 UTC on July 12th suspicious mails were received and alarmed the Debian admins. The following investigation turned out that a developer account was compromised and that a local kernel vulnerability has been exploited to gain root access. At 04:30 UTC on July 12th gluck has been taken offline and booted off trusted media.


by Dawn Kawamoto

June 29, 2006

Security experts warn of two flaws in IE, and in an unusual twist, one of them can be replicated in Firefox.

Two new security flaws have been discovered in Microsoft's Internet Explorer, and one could also affect Mozilla's Firefox, security experts have warned. Code for both the vulnerabilities has been published, but there have been no reports of attacks taking advantage of the flaws , the SANS Internet Storm Center, which monitors network threats, said in an advisory released Wednesday. The flaw that affects both IE and Firefox is related to the handling of a technology that is used to access documents delivered from one Web site to another, according to the advisory.


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options.