Whistling In The Dark

OK, this is not tech related but I’d like to know the answer. What exactly does ‘whistling in the dark’ mean? I found several different definitions (not including sexual ones. This is a family blog): To attempt to keep one’s courage up (from reference.com, Steve The Whistler ) Trying to make a point or convince people …

Continue reading ‘Whistling In The Dark’ »

More On Korgo

More on the phishing worm I mentioned in a previous post. Mikko H. Hypponen of F-Secure has passed on a little more information. He says it’s “pretty big, but still far away from outbreaks like Sasser or Mydoom”. So far “at least 50,000 machines are infected worldwide, possibly more”. He says Korgo does “specifically target …

Continue reading ‘More On Korgo’ »

A Phishing Worm

Welcome to the phishing worm. Korgo, a new worm that appeared last week, scans for random machines to infect and attack, using a vulnerability in Windows called the LSASS flaw which was discovered in April, according to Internet Week. Korgo, also known as Padobot, then sits on users’ computers waiting for instructions from home. Most such …

Continue reading ‘A Phishing Worm’ »

Phishing, And Some Advice

I was just reading the new publication put out by the U.S. Financial and Banking Information Infrastructure Committee and the Financial Services Sector Coordinating Council on “Lessons Learned by Consumers, Financial Sector Firms, and Government Agencies during the Recent Rise of Phishing Attacks” (PDF here, page on Treasury website here). A rather wordy title for …

Continue reading ‘Phishing, And Some Advice’ »

This week’s column – Visualizing Tools

This week’s Loose Wire column takes a look at programs that visualize your hard disk. ONE OF THE CRAZY THINGS about computers is that the more we use them, the more of a mystery they become. Think of all the things you’ve done with your computer: reading and writing e-mail, browsing Web sites, downloading (and …

Continue reading ‘This week’s column – Visualizing Tools’ »

Anti Phishing Tools And The Lull Of False Security

From Buzz Bruggeman, here’s another tool that may help fend off phishing attacks (here’s an earlier post on similar software): SpoofStick, a browser extension that sits in either IE or FireFox and tells you what website you’re really visiting. It works like this: Many phishing scams conceal the real website in a link behind tricks …

Continue reading ‘Anti Phishing Tools And The Lull Of False Security’ »

The Bluesnarfing Skeptics

Is Bluesnarfing the big problem it’s made out to be? “Traditionally,” wrote Guy Kewney of eWeek earlier this month, “security consultants have made a passable living by frightening ignorant managers with security holes. Then they charge money to fix them.” He then takes a look at bluesnarfing, which regular readers of this blog and the …

Continue reading ‘The Bluesnarfing Skeptics’ »

Double Checking A Phishing Scam

Sometimes the usual checks to see whether an email is a phishing scam or not don’t work. Here’s an example. This morning I received a quite credible looking PayPal email. Of course it had all the hallmarks of a phishing scam too, but then again I’ve received some genuine emails I thought were phishers, so …

Continue reading ‘Double Checking A Phishing Scam’ »

This week’s column – Flash Drives Aren’t Flash

This week’s Loose Wire column is about Flash drives:  I LEFT YOU last week in the capable hands of Ethel Girdle, the fictitious octogenarian who took her accusations of built-in obsolescence to the technology giants. One of her beefs was about so-called flash drives–small devices that store data, for example as memory cards for MP3 …

Continue reading ‘This week’s column – Flash Drives Aren’t Flash’ »

Didtheyreadit’s Response To Privacy Issues Part II

More on Alastair Rumpell’s response to my privacy concerns about his new email monitoring service, didtheyreadit.  (Here’s the first one.) I wondered how the email addresses harvested by Rampell would be used (These would include all emails sent from and to recipients via the service since as far as I can understand it didtheyreadit, unlike …

Continue reading ‘Didtheyreadit’s Response To Privacy Issues Part II’ »