wp-admin

Botnet responsible for spam taken down

Botnet responsible for as much as 50% of global spam taken down   Computer security experts on Wednesday revealed that they had successfully taken down Grum, the world’s third-largest botnet, which was responsible for roughly 18% of global spam, according to The New York Times. According to CNNMoney, that figure could be as high as 50%. The security experts were able to block the botnet’s...

Read More

Targeted Attacks on SMB’s Increase

Targeted Attacks on SMB’s Increase in 2012 In the first six months of 2012, 36 percent of targeted attacks focused on small businesses of fewer than 250 employees, and there were an average of 58 attacks per day, according to a new research report. At the end of 2011, small businesses were on the receiving end of only 18 percent of such attacks. Despite that statistic, those large...

Read More

Microsoft fix kills Windows Gadgets

Microsoft has warned that a Gadgets feature included in Vista and later versions of Windows could allow attackers to hijack end-user machines and has taken the unusual step of issuing a temporary update that allows it to be completely disabled. “An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user,” company...

Read More

HP Switches Shipped w/Malware

HP is warning customers that some of its ProCurve switches were shipped recently with compact flash cards infected with malware. The company said that a number of software versions in the ProCurve 5400 switch were affected, and that PCs could be become infected by the malware under some conditions. HP did not provide details on which piece of malware was included on the switches or what the...

Read More

Detect Phishing Attacks

To help better protect you, our valuable customers, I would like to point this post back to an article on Make Us Of’s web site. They have a good article on methods to detect what are called “Phishing” attacks. This is a method where in a “hacker” tries to obtain your personal information via a spoof. Here is the opening part of the article, to read the whole...

Read More