BuyLow.com Computers And Internet - Internet Security, Computers, Mobile Devices, Networks

BuyLow.com | Resources | Contact Us


 

E-mail Is Insecure by Default

E-mail is insecure because it is more like a postcard, not a sealed envelope.
A number of people are under the misconception that when they draft and send e-mail, two things occur. Their message gets sealed in an envelope (that’s why you have to open e-mail right?) and that it goes directly to the person it [...]

Read More About - E-mail Is Insecure by Default »

Understanding Your Computer: Email Clients

How do email clients work?
Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server.
For example, let’s assume that your email address is johndoe@example.com, and the person you are contacting is at [...]

Read More About - Understanding Your Computer: Email Clients »

LifeLock “ID Theft Protection” Claims

HARRISBURG – Pennsylvania, along with 34 other states, has reached a $12 million settlement with LifeLock Inc, an Arizona-based company accused of making confusing or misleading statements in the advertisement and promotion of its identity theft protection services.
“Identity theft is a major subject of concern and consumers deserve clear and accurate information before they spend [...]

Read More About - LifeLock “ID Theft Protection” Claims »

Widespread P2P Data Breaches

The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has [...]

Read More About - Widespread P2P Data Breaches »

Top British Spy Life Put on Facebook by Wife… Cover Blown?

London — You need to be careful what you post to social networking sites. The Mail, a London newspaper, reported that the new head of the British Spy agency (Sir John Sawers ) the Secret Intelligence Service cover was blown on Facebook. The SIS, more popularly known as MI6, is England’s intelligence gathering organization. [...]

Read More About - Top British Spy Life Put on Facebook by Wife… Cover Blown? »

Phishing Scams: Chase, Bank of America, Sun Trust

Alert — There is a massive new bank fraud phishing scam being conducted via email. The website address that appears in the body of the email looks valid; however, if you view the source, you will see a bogus domain name. Clicking on the link will take you to an unauthorized website. [...]

Read More About - Phishing Scams: Chase, Bank of America, Sun Trust »

Google’s Latitude Tracks Your Every Move

Google has released a new application called Latitude. The service allows a user to share their physical location with friends and family. Using cell phones towers and WIFI connections, Google creates a map that shows your location and movements. Though they claim your privacy is protected, many people are concerned.
Here is how [...]

Read More About - Google’s Latitude Tracks Your Every Move »

Google’s New Web Browser Let’s You Go Incognito

Web browsing has become safer with Chrome, Google.com ’s browser. You can download it for free. It’s lightweight on your computer resources but heavy duty on surfing the web… pages load faster.
There is also an awesome feature that is the antithesis of Microsoft’s Internet Explorer (IE) web browser — secure browsing. Whereas Microsoft tries to [...]

Read More About - Google’s New Web Browser Let’s You Go Incognito »

Recovering from a Trojan Horse or Virus

by the United States Computer Emergency Readiness Team
www.us-cert.gov
Michael D. Durkota and Will Dormann It can happen to anyone. Considering the vast number of viruses and Trojan horses traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. Hindsight may dictate that you could have done a better job of protecting yourself, [...]

Read More About - Recovering from a Trojan Horse or Virus »

Is your company keeping information secure?

Federal Trade Commission
Are you taking steps to protect personal information? Safeguarding sensitive data in your files and on your computers is just plain good business. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. A sound data security plan is built on five key principles:
* Take [...]

Read More About - Is your company keeping information secure? »

RSS BugTraq

  • [SECURITY] [DSA 2100-1] New openssl packages fix double free
    Posted by Moritz Muehlenhoff on Aug 30------------------------------------------------------------------------ Debian Security Advisory DSA-2100-1 security () debian org http://www.debian.org/security/ Moritz Muehlenhoff August 30, 2010 http://www.debian.org/security/faq ------------------------------------------------------------------------ Package : opens […]
  • Re: [Full-disclosure] QtWeb Browser version 3.3 build 043 Insecure DLL Hijacking Vulnerability (wintab32.dll)
    Posted by security curmudgeon on Aug 30: 1. OVERVIEW : : The QtWeb Browser application is vulnerable to Insecure DLL Hijacking : Vulnerability. Similar terms that describe this vulnerability have been : come up with Remote Binary Planting, and Insecure DLL : Loading/Injection/Hijacking/Preloading. : 3. VULNERABILITY DESCRIPTION : : The QtWeb Browser applicat […]
  • [ MDVSA-2010:165 ] libHX
    Posted by security on Aug 30 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2010:165 http://www.mandriva.com/security/ _______________________________________________________________________ Package : libHX Date : August 30, 2010 Affected: 2009.0, 2009.1, 2010.0, 2010.1 _________________________ […]
  • {Lostmon - Groups} Safari for windows Invalid SGV text style Webkit.dll DoS
    Posted by Lostmon lords on Aug 30################################################### Safari for windows Invalid SGV text style Webkit.dll DoS Vendor URL:www.apple.com Advisore:http://lostmon.blogspot.com/2010/08/safari-for-windows-invalid-sgv-text.html Vendor notify :Yes exploit available :YES ################################################### Safari browse […]
  • R7-0036: FCKEditor.NET File Upload Code Execution
    Posted by HD Moore on Aug 30R7-0036: FCKEditor.NET File Upload Code Execution August 30, 2010 -- Vulnerability Details: FCKEditor contains a file renaming bug that allows remote code execution. Specifically, it is possible to upload ASP code via the ASP.NET connector  in FCKEditor. The vulnerability requires that the remote server be running IIS. This vulne […]