The new breed of rootkits is operating system-agnostic. 64-bit implementations of BSD, Linux, MacOS X, Windows Vista are all considered vulnerable, as long as they're riding atop the wrong chips from AMD and Intel. VM rootkits quietly sieze control of the chips' virtualization technology to control or pervert any and every process the attacker chooses. Current defense possibilities are depressingly mechanical.

When eBay's CEO Meg Whitman sends you a personal letter, it's only polite to respond... especially when it's about one of her pet crusades: Net Neutrality. Unfortunately, I discovered that her mail server could send mail, but appeared to be incapable of accepting replies. "Must be a DNS goof-up," thought I. So I posted my personal reply right here. Please don't read it if you are not Meg Whitman. It's personal.

After a year of testing, French virus experts have concluded that Microsoft Office is less dangerous than its competitor, OpenOffice. In the short term, this is great news for Microsoft... outside of Europe. More anti-open source FUD will delay some planned migrations. Longer term, OpenOffice will benefit, as France and Germany pour resources into securing the product they now rely upon. The race is, as they say, afoot.

Self-installing programs can be nice, when you invoke them by choice. But researchers have found thousands of viruses that execute after you innocently click a promising search link. Outraged users are demanding that Google, MSN and Yahoo do something about it. Luckily, Microsoft already has.

The latest version of MyDoom uses an old trick with a new twist, IP spoofing from a trusted source, to fool network managers and users into infecting their own systems. Email Battles shows you how to set your filters to prevent MyDoom.M and its siblings from penetrating your network.

Next Page »

Adware Apple Broadband Browsers Email Exchange Groupware Identity Theft IM Intellectual Property Linux Lotus Microsoft Misc. Mobile Open Source Operating Systems P2P Phishing Privacy Programming Scams Search Security Spam Spyware Viruses VOIP Vulnerabilities Wireless

Network Tools