What's up IT?
Hackers becoming more clever
Monday, 28 June 2004 16:06 ESTHackers have been increasingly clever in disguising their “worms,” prompting the recipient to bring them to life by clicking on an e-mail attachment that sets off the malicious program. They arrive in users’ mailboxes with an insidious array of subject lines, including warnings purportedly from the user’s computer system administrator: “Your e-mail privileges are being suspended” or “Child pornography has been found on your computer.” The most devious message informs the recipient his computer has been infected by a worm and is being used to send spam. It advises the user to click on the attachment to remove the worm — but of course, opening the attachment actually installs it.
Also increasingly common: by grabbing legitimate e-mail addresses from an infected PC’s address book, worms often manage to make their messages appear to come from a friend or co-worker.
It’s a clever move, since security experts have long advised PC users to open only those attachments sent by people they know.
|
Featured Articles
Tribal thinking in todays IT
George Santayana once famously observed; Those who cannot remember the past are condemned to repeat it.. But when it comes to IT security, a better way of thinking might be; those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed
You cant manage what you cant see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.
The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.
Network Security Tools

SpyDefense SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.

Proactive Security Auditor Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.

File Securer File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.
Press Releases
Parasoft Jtest Wins Best Application Test Tool as part of InfoWorld's Annual Technology of the Year Awards
Akonix Security Center Publishes IM Threat Watch for December 2005
Tool for camouflaging threats in WMFs discovered, informs Panda Software
|