In past, malicious web sites seemed relegated to the "bad neighborhoods" of the Internet. If you weren't surfing piracy, pornography, or hacking sites, you probably wouldn't have randomly encountered websites serving malicious code back then. Unfortunately, that has changed. Over the years, legitimate web sites have increasingly been hijacked, and booby-trapped with malicious … [Read more...]
The HBGary vs. Anonymous Saga: What can we learn?
If you follow security news, then you’ve surely heard about the recent drama between “Anonymous” and the HBGary security firm (more on who Anonymous is below), which took place over the past few weeks. While I’ve personally followed this fiasco with great interest, I’ve avoided commenting about it here, since most of our customers and readers are network administrators who are … [Read more...]
IE Suffers from Five New "Drive-by Download" Vulnerabilities
Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: Various, in the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: Deploy the … [Read more...]