Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

 Title   Date   Author   Host 

F-Secure Weblog

by Mikko

January 25, 2013

This is how January 25th started for us, 10 years ago: Jan 25 05:31:54 kernel: UDP Drop: IN=ppp0 SRC= DST= TTL=117 ID=30328 PROTO=UDP SPT=2201 DPT=1434 LEN=384

The above snippet is the first log we have of what become known as the Slammer worm (or Sapphire or SQL Slammer). Slammer produced tons of network traffic. Here's an old screenshot from, showing how the global packet less skyrocketed due to the worm...

by Christina Desmarais

July 24, 2013

Privacy is an increasingly rare commodity these days. Just search for yourself on might be surprised at the number of companies that claim to have information about your family, income, address, phone number and much, much more.

That's because your personal information, including your email address, phone number and social security number, is worth a lot of money to legitimate businesses and bad guys alike. The bad guys just want to steal from you. Companies want to know as much about you as possible so they can sell you more products and services or serve you ads that are highly relevant to your demographics and preferences. So take these simple steps to protect your valuable personal information...

by Nicole Henderson

December 21, 2010

New York City bus tour company CitySights NY announced earlier this month that a SQL injection attack on its web server compromised about 110,000 credit card numbers.

Although the breach happened on September 26, it was discovered a month later on October 25 when a web programmer noticed the unauthorized script. The database held customer financial data, including the customer's name, address, email address and credit card information. Included in the credit card information was the expiration date and card verification value (CVV2) data.

CNS News

by Matt Cover

February 27, 2013

American government agencies - state, local, and federal -- made a record 13,753 requests to read emails or gather other information sent through Google's Gmail and other services in 2012, more than half without warrants.

The total number of users about whom government agencies wanted information also set a record at 31,072, up from 23,300 in 2011, the first year Google began reporting the data. The discrepancy comes because government agencies request information on multiple users or accounts at the same time. Most of these 13,753 requests, 6,542 of 8,438 in the latter half of 2012 alone, were done without a search warrant, Google data show.

by Will Sturgeon

July 16, 2011

The number of viruses being written and released continues to grow year on year, with 2004 already looking set to pass many malware milestones.

Sasser has accounted for more than a quarter (26.1 per cent) of all email-borne viruses. The prolific Netsky.P accounted for 21.4 per cent while the .B and .D variants accounted for 11 per cent and 6.8 per cent respectively, according to antivirus vendor Sophos, making Netsky in all its forms by far the most prolific.

by Michael Snyder

June 17, 2013

There seems to be a lot of confusion about what the NSA is actually doing. Are they reading our emails? Are they listening to our telephone calls? Do they target American citizens or is it only foreigners that they are targeting?

Unfortunately, the truth is that we aren't going to get straight answers from our leaders about this. The folks running the NSA have already shown that they are willing to flat out lie to Congress, and Barack Obama doesn't exactly have the greatest track record when it comes to telling the truth. These are men that play word games and tell lies for a living. So it would be unrealistic to expect them to come out and tell us the unvarnished truth about what is going on. That is why it is so important that whistleblowers such as Edward Snowden have come forward. Thanks to them and to the brave journalists that are willing to look into these things, we have been able to get some glimpses behind the curtain. And what we have learned is not very pretty. The following are 21 facts about NSA snooping that every American should know...

Commtouch Cafe

by Avi Turiel

June 6, 2012

This Amazon order confirmation email is a fake. Every link leads to malware.

Every link (there are 8 in this example - similar to this attack) leads to a different compromised WordPress site. And they all seem to be using one of the most common WordPress theme...twentyten.

Microsoft Small Business Center

by Kim Komando

July 16, 2011

Computer intrusions have grown so rapidly in recent years that they are no longer just an aggravation. They now represent a critical threat to your business.

In June 2004, the Gartner Group reported that online bank accounts had been looted of $2.4 billion in just the previous 12 months. It estimated that 1.98 million adults had suffered losses.

by Jason

April 12, 2012

Over the past few weeks Macs have been hit with a widespread malware attack. Per capita, the Flashback trojan infected as many machines as Conficker, the Windows malware that made international news in 2008.

For proud Mac users this is finally enough evidence to convince some that Mac malware actually exists. Here's what you need to do to secure your Mac...

by David Spark

February 19, 2013

Information security is a weird egg. You can be in it and understand it, yet have a hard time explaining it to the lay person or even your colleagues.

For that reason, the infosec industry has glommed onto a never-ending chain of analogies and metaphors to better explain the intangibles of digital security. We can't seem to keep them all straight, nor do we know them all. So we reached out to security influencers and asked them what their favorite and least favorite infosec analogies or metaphors were and why they loved and hated them so much. I took a little editorial liberty and squeezed in a few sayings that don't necessarily qualify as analogies or metaphors, but I think you'll appreciate them nonetheless.


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith

Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit to learn about your preschool options.