Profile of Gregg Keizer
News & Commentary Posts: 1659
Articles by Gregg Keizer
posted in July 2005
Cisco sent a cease-and-desist letter to at least one Web site that posted a leaked copy of an exploit technique against its routers. The technique, which Cisco has been working to suppress in court, was demonstrated publicly at the Black Hat security conference.
Phishers use Internet chat to communicate with each other and buy and sell victims' financial information.
Even as Cisco admitted to the problems, Symantec warned that the information shared at the conference "increases the threat of exploitation."
Both Intel and AMD have touted the notion, which essentially means setting some areas of memory as off-bounds to prevent worms and other malicious code from inserting functions into memory and executing them. But one researcher says the scheme won’t stop all attacks.
The tabbed-browser beta went out to 10,000 testers already lined up for Windows Vista Beta 1, as well as 500,000 members of Microsoft's TechNet and MSDN programs.
Hackers are increasingly interested in digging up dirt on enterprise antivirus software. A pair of security researchers explains why customers should worry.
In another new malicious twist, hackers are using free personal Web hosting sites provided by nationally- and internationally-known ISPs to store their malicious code, and to infect users with worms, viruses, and spyware.
A survey about Internet terms finds that most Americans are not on the cutting edge of technology, except when it comes to security. Spyware, firewalls, cookies and adware are understood by most.
Some experts urge the government to plan better for recovering from a widespread attack on the nation’s computers.
Microsoft has a new name for its next major operating system, and the software giant has set aside its long practice of using release years or acronyms to describe its flagship product.
The suspects supposedly formed a members-only group to trade messages and buy and sell their goods.
Apple snags fourth place in national computer seller rankings, and one analysts suggests a big reason is a "halo effect" from the iPod, which has been nudging Windows fans to buy Macs.
President Bush's nominee for Supreme Court justice may have a better grasp than most on the court when it comes to technology issues, sources say.
Several prominent U.S. Senators, including the leaders of the Commerce Committee, have introduced another bill that takes on the growing online menace of identity and data theft.
The bug might be used by an attacker to take over a target PC, says Symantec, although Microsoft disagrees.
Blue Security plans to overwhelm spammers with complaints and unsubscribe requests.
Security experts think a large-scale, coordinated phishing campaign is being waged by computer criminals, because of a big run-up in the number of Trojan horses, Trojan horse downloaders, and new malicious sites.
The downturn in losses is because of both better management of security tools and sheer luck in the form of a 12-month run without fast-spreading, big-dollar-amount attacks. But the survey also detailed some gloomier news: Losses to identity and information theft are up--way up.
The vulnerability in Microsoft Word is only the latest in a spreading trend that's seeing hackers probe for foibles and failings in file formats, a security firm says.
A U.K.-based security firm is touting a new service that scours corporate networks for zombies -- PCs that have been hijacked without the owner's knowledge and turned into spam-spewing engines.
The Mozilla Foundation updates its Firefox stand-alone browser to version 1.0.5, fixing several vulnerabilities that have popped up since the last minor upgrade two months ago.
Microsoft releases a trio of security bulletins, all tagged as critical, two for Windows, the third for older editions of Microsoft Word.
Spammers are continuing to adopt Sender ID and Sender Policy Framework, two of the prominent e-mail authentication schemes that are actually intended to stop spam.
Microsoft issues an open letter to customers explaining why it changed how its anti-spyware software handles adware from Claria, a pervasive brand of adware.
Populist photojournalism took a bow on photo-sharing sites after Thursday's terrorist attacks.
Microsoft quietly changed how its for-free AntiSpyware program handles a pervasive form of adware, a move that has drawn criticism because of recent reports that Microsoft is interested in buying adware-maker Claria.
The number of new viruses, worms, and Trojans is up nearly 60% in the first half of 2005, a security researcher says.