Caution Consumers: Job-search Email Scam
HARRISBURG – Attorney General Tom Corbett today cautioned Pennsylvania job-seekers to be extremely cautious about Internet employment offers that ask applicants to email copies of their personal credit reports.
“Credit reports contain a wealth of background information about consumers, including social security numbers, summaries of bank and credit card accounts, employment history, current and previous addresses [...]
Read More About - Caution Consumers: Job-search Email Scam »
China Censors Coogle and Hammers Computer Makers
Green Dam Youth Escort
Beijing, China — The Chinese government has ordered PC (personal computers and laptops) makers to install Green Dam Youth Escort filtering software as of July 1. Representatives claim it is to prevent youth from viewing pornography on the Internet; however, independent analysis of the software revealed it blocked political content the [...]
Read More About - China Censors Coogle and Hammers Computer Makers »
Update for Microsoft Outlook Phishing Scams
A massive phishing scam similar to the recent bank fraud scams is being sent in emails that look like the following:
From: “Microsoft Customer Support”
Subject: Update for Microsoft Outlook
Critical Update
Update for Microsoft Outlook / Outlook Express (KB910721)
Brief Description
Microsoft has released an update for Microsoft Outlook / Outlook Express. This update is critical and provides [...]
Read More About - Update for Microsoft Outlook Phishing Scams »
Phishing Scams: Chase, Bank of America, Sun Trust
Alert — There is a massive new bank fraud phishing scam being conducted via email. The website address that appears in the body of the email looks valid; however, if you view the source, you will see a bogus domain name. Clicking on the link will take you to an unauthorized website. [...]
Read More About - Phishing Scams: Chase, Bank of America, Sun Trust »
Microsoft Security Bulletin
Microsoft has released an update to address vulnerabilities in Microsoft Windows, Office, and Internet Explorer as part of the Microsoft Security Bulletin Summary for June 2009. These vulnerabilities may allow an attacker to execute arbitrary code, operate with elevated privileges, or obtain sensitive information.
Apple Safari Vulnerabilities
Apple has released Safari 4.0 for Windows and Mac OS X to address multiple vulnerabilities in CFNetwork, CoreGraphics, ImageIO, International Components for Unicode, libxml, Safari, Safari Windows Installer, and WebKit. These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, obtain sensitive information, bypass security restrictions, or conduct cross-site scripting [...]
7 Practices for Computer Security
1. Protect your personal information. It’s valuable.
2. Know who you’re dealing with.
3. Use security software that updates automatically.
4. Keep your operating system and Web browser up-to-date, and learn about their security features.
5. Protect your passwords.
6. Back up important files.
7. Learn what to do in an e-mergency.
Access to information and entertainment, credit and financial services, products [...]
Android: Open Source Opperating System
Android is an open source operating system that was originally developed by Google for use on cell phones and mobile devices.
Acer has announced that Android will be used on their new netbooks.
The good news is that Android is distributed for free and is improved upon by the open source community. This will give consumers [...]
Alert: Apple iTunes
Apple Releases iTunes 8.2 and QuickTime 7.6.2
Apple has released iTunes 8.2 and QuickTime 7.6.2 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.
US-CERT encourages users to review Apple articles HT3592 and HT3591 and apply any necessary updates to help mitigate the risks.
Available for: Mac [...]
BlackBerry Security Advisory
Research In Motion has released security advisory KB18327 to address multiple vulnerabilities in the PDF distiller of the BlackBerry Attachment Service. By convincing a user to open a specially crafted PDF file on a BlackBerry smartphone, an attacker may be able to execute arbitrary code on the computer hosting the BlackBerry Attachment Service.
US-CERT encourages [...]