Strict Standards: Redefining already defined constructor for class wpdb in /home3/river938/public_html/sec/wp-blog/wp-includes/wp-db.php on line 56

Deprecated: Assigning the return value of new by reference is deprecated in /home3/river938/public_html/sec/wp-blog/wp-includes/cache.php on line 36

Strict Standards: Redefining already defined constructor for class WP_Object_Cache in /home3/river938/public_html/sec/wp-blog/wp-includes/cache.php on line 384

Strict Standards: Declaration of Walker_Page::start_lvl() should be compatible with Walker::start_lvl($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 541

Strict Standards: Declaration of Walker_Page::end_lvl() should be compatible with Walker::end_lvl($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 541

Strict Standards: Declaration of Walker_Page::start_el() should be compatible with Walker::start_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 541

Strict Standards: Declaration of Walker_Page::end_el() should be compatible with Walker::end_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 541

Strict Standards: Declaration of Walker_PageDropdown::start_el() should be compatible with Walker::start_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 560

Strict Standards: Declaration of Walker_Category::start_lvl() should be compatible with Walker::start_lvl($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 659

Strict Standards: Declaration of Walker_Category::end_lvl() should be compatible with Walker::end_lvl($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 659

Strict Standards: Declaration of Walker_Category::start_el() should be compatible with Walker::start_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 659

Strict Standards: Declaration of Walker_Category::end_el() should be compatible with Walker::end_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 659

Strict Standards: Declaration of Walker_CategoryDropdown::start_el() should be compatible with Walker::start_el($output) in /home3/river938/public_html/sec/wp-blog/wp-includes/classes.php on line 684

Deprecated: Assigning the return value of new by reference is deprecated in /home3/river938/public_html/sec/wp-blog/wp-includes/query.php on line 21

Deprecated: Assigning the return value of new by reference is deprecated in /home3/river938/public_html/sec/wp-blog/wp-includes/theme.php on line 540

Warning: Cannot modify header information - headers already sent by (output started at /home3/river938/public_html/sec/wp-blog/wp-includes/wp-db.php:56) in /home3/river938/public_html/sec/wp-blog/wp-includes/feed-rss2.php on line 2
Secure Computing - Plain and Simple. http://www.secure-computing.info/wp-blog Computer Security for Everyday People. Just What You Need to Know. Thu, 30 Nov 2006 05:43:24 +0000 http://wordpress.org/?v=2.3.1 en Anti-spyware Tops Download Charts, But That’s Not the Whole Story. http://www.secure-computing.info/wp-blog/?p=4 http://www.secure-computing.info/wp-blog/?p=4#comments Thu, 30 Nov 2006 05:42:24 +0000 RGlover http://www.secure-computing.info/wp-blog/?p=4 There are hundreds of software download websites, but CNET’s www.download.com is the king of them all with millions of downloads every day. It is also a good place to see what’s hot in the world of software, a kind of New York Times bestseller list for geeks. I find it pretty interesting and educational. Here’s why.

As of today, the #1 downloaded program is Spy Sweeper – a powerful anti-spyware tool. About 1.2 million people install it every week. Spy Sweeper is followed by two other anti-spyware products: Spyware Doctor and Ad-Aware. So far so good. People are aware of the spyware threat and are taking action to mitigate it.

Next line down the list… Oh, no! This is LimeWire! Yes, the #4 is occupied by a file-sharing program that is ideally suited to proliferate malware. But that’s not it. A few lines below we see our good old file-sharing friend Morpheus at #7. As if that was not enough, there is BitTorrent, another risky program, at #9.

So, in the top ten downloaded software programs, we find three anti-spyware tools and three potential spyware mediums. Do you see a pattern here?

]]>
http://www.secure-computing.info/wp-blog/?feed=rss2&p=4
Are you a sitting duck for hackers? http://www.secure-computing.info/wp-blog/?p=3 http://www.secure-computing.info/wp-blog/?p=3#comments Fri, 24 Nov 2006 05:42:42 +0000 RGlover http://secure-computing.info/wp-blog/?p=3 Our global Internet neighborhood continues to grow at an astounding rate. And like almost any other neighborhood, it can be dangerous. In the real world most of us intuitively know the do’s and don’ts of staying reasonably safe: don’t take candy from a stranger, don’t flash loads of cash, etc. We know this from experience and from what our parents have taught us.

Unfortunately, in the brave new world of the Internet, things are not as straightforward. The underlying reason why this is the case is that our perception of what is happening inside our computers is very limited. For example, if somebody was trying to steal your wallet, you would be able to see it and feel it. If, on the other hand, a hacker is stealing credit card information from your computer, you may find out about this months later.

So how do you minimize your chances of being a victim of computer crime? One of the best things to start with, is to realize that some online behaviors are much more risky than others. For example, using file sharing software, such as Morpheus or LimeWire virtually guarantees a spyware infection, unless your computer is equipped with industrial-strength security software that is properly configured and up to date.

There are many other high-risk behaviors that greatly increase the likelihood of you becoming a target of cybercrime. I’m working on an interactive risk evaluator that promises to be both fun and useful, so stay tuned! (For now, I recommend that you take a look at 10 most dangerous things you can do to compromise your computer’s security ).

]]>
http://www.secure-computing.info/wp-blog/?feed=rss2&p=3