Antivirus and Anti-malware companies on Twitter
Most readers of this site will know what Twitter is and probably use it on a regular basis but for those that don’t, it is a micro-blogging site where the articles are 140 characters or less. It’s...
View ArticleBrowsers versus malware sites, IE8 twice as good as the competition
Apparently Internet Explorer 8 is exceptional at blocking malware sites. Out of 492 malware sites IE8 blocked 69% of them. You might be thinking that they still missed 40% of them but the next closest...
View ArticleApple patent for iPhone Loss Prevention
Apple yet again shows us why they are the current leader in the phone industry with a recent patent filing. The patent is concerning a design feature that would allow a iPhone owner to set certain...
View ArticleMalware writers have some very loyal customers
When considering moving to a different operating system it is always good to ask “Are the programs I have purchased compatible?”. Sometimes however you can expose just how foolish you have been in...
View ArticleD-Link adds CAPTCHAs to their routers
Malware is just an accepted part of today’s computing but it is getting more aggressive and is even targeting non-traditional areas such as routers and DSL modems. Thankfully router manufactures are...
View ArticleContrary to previous reports Microsoft did NOT make a special version of XP...
Two weeks ago Wired reported that Microsoft made a custom version of Windows XP for the Air Force. The story was widely reported all over the Internet showering praise upon Microsoft for their...
View ArticleBackTrack 4 Pre-Release and the Video To Get You Started
Somehow I missed that BackTrack 4 is now in the “Pre-Release” stage as of June 19. Once I did realize that it was released I waited to post about it because their servers have been getting hammered so...
View ArticleVote For Your Favorite Ad-Aware Skin
Ad-Aware is one of those anti-malware applications that most of us use on a regular basis and are familiar with the way that it looks but Lavasoft (the ad-aware parent company) is looking to change...
View ArticleTxt 2 Own
This post is from our new OS Attack author Andrew Seay. Please help him feel welcome – Paul Charlie Miller, aka Safari Charlie, recently revealed the exploit code which allows an attacker to take...
View ArticleRemove the Security Warning on files downloaded from the Internet
One of the most annoying things in both Windows Vista and Windows 7 is the inclusion of obsessive security policies. The one that has been bothering me quite a bit lately is a little prompt that is...
View ArticleAre legacy operating systems really “dangerous”?
One of my all-time favorite operating systems is Windows 2000 and I would continue to use it today if I was not so worried about security. Many people still use Windows 98, 2k and XP because they...
View ArticleTechnician Tool: SecuritySoftView View Installed Anti-Malware Applications
As a computer technician one of the most bothersome issues to encounter is a machine with multiple anti-malware applications installed on it. This can cause extreme performance issues as well as even...
View ArticleWhy is Windows 10 connecting to akamaitechnologies?
Let me first start by saying that this is by no means a definitive or authoritative answer and is more of my theory using the evidence I have found as to the purpose of these connections. After my...
View Article