Windows 7 Search – a Blunder of Microsoft

The major factor that makes Microsoft win over Linux or Unix in OS wars, is its ease in usability. Windows has made operating computer an easy thing even for a non-techie. The reason why we still bear the vulnerabilities in Windows and Microsoft’s overwhelming patches without complaining, is definitely that you cannot get an alternative for an easily operatable OS as Windows.

However, after Windows XP

Continue Reading

Most Dangerous Activities to Avoid Online

The Internet today is filled with huge amount of malware activities and one small mistake can make you fall prey to them. These mistakes often end up in infection of the PC or exploit online accounts (bank accounts, credit cards, etc.) of the user. The activities you need to avoid online are as follows:

Not dealing seriously with passwords
Everyone knows that passwords are important. Yet

Continue Reading

Emerging Malware Trends: Smartphone Malware

Ever since the mobile phones have included web browsing technologies, they were a major hit among users. The latest smartphones have even put mobile users a step ahead with exclusive features like online shopping, downloading, video streaming, social networking, mobile applications, email, and even document editing and sharing.

Recently, a report (by Conductor) said that smartphone ownership increased roughly 58% during the year 2010

Continue Reading

Added IE9 Features and What They Mean for Users?

IE9 got released on 14 Mar’ 2011 at the South by Southwest Interactive Festival (SXSW) in Austin, Texas. Microsoft announces that IE9 as not only fastest, most standards-compliant version of IE yet, but also as one that can stand up and compete on features and looks with Mozilla Firefox, Google Chrome, Apple Safari, and the Opera browser. Few interesting features of IE9 stands as follows:

Continue Reading

Web Chicanery followed by Earthquake and Tsunami Disaster

Immediately after the massive earthquake and tsunami in Japan, experts noticed many Internet fraudsters exploiting the situation through black hat SEO techniques.

The experts said that the criminals immediately started customizing their malicious websites, including keywords related to tsunami and earthquake, to get on top of the search results using black hat seo methods. It has been found out that they were trying to deploy malware

Continue Reading

Linux Routers Targeted by Tsunami Malware

Ever thought Linux is invulnerable and robust against malware attacks? then its time to rethink. Security researchers at TrendMicro found malware that can exploit routers based on Linux and Unix platforms. The malware, though was said to be predominantly found in Latin America, has possibilities of spreading to other regions.

Potential of the threat
As per the source: the malware code, found to be ELF_TSUNAMI.R, has

Continue Reading

Latest Versions of Chrome and Firefox Released

Google had released latest version for Chrome (9.0.597.107) fixing around 19 bugs on Monday. And within no time Mozilla has also come up with latest version of Firefox (3.6.14).

Interestingly, these were released just before the Pwn2Own hacking contest (to be starting on March 9th). Even in 2010, Google released 4.1.249.1036 version, days before the contest. Apple also had released updates for Safari in 2010 in

Continue Reading

Trends in Identity Theft – 2010

More than 8.1 million adults in U.S. fell victim to the ID theft for the year 2010. Though the number of identity theft instances decreased, the amount lost by the victims rose significantly, as per the 2011 Identity Fraud Theft Report from Javelin Strategy & Research.

New types of consumer frauds have evolved into the market incurring more losses to the victims. The average amount lost

Continue Reading

Microsoft to Fix Autorun Issue for Windows XP

The windows autorun feature has been a cake for the malware and botnet creators, based on which they designed many attacks. Being a main aid to trojans and viruse like Conficker, Taterf, Rimecud, Autorun, etc, the autorun was more seen to be as a vulnerability than a feature.

PCs using Windows XP were the most exploited ones due to the autorun feature. According to Microsoft, Windows

Continue Reading