The Dangers of Social Networking

Social sites such as Facebook and MySpace are a big hit nowadays; not just with the young generation but with people of all ages. It’s an amazing platform for people to connect but it certainly isn’t without its dangers. As with all things in life, there are dangers and then there are dangers. Recently I […]

Continue reading

Could Cross Platform be used as a means of redundancy?

I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. The engineers quickly replaced the Windows machines with their Linux development stations and this ensured […]

Continue reading

Thousands of Hotmail login credentials stolen

News has broken out that a large number of Hotmail/Windows Live credentials have been stolen and published on the internet. It is not yet clear how these credentials were obtained; however, Microsoft claims it was by means of a phishing attack. In any case I recommend that you change your password/secret question at once should […]

Continue reading

Keeping your bank accounts safe from cybercriminals

I have dealt with cyber crime in a number of previous posts, such as the 21st Century heists series. This post chronicles a recent event about some of the themes tackled in that series. Finjan has recently released a report about yet another case of high tech bank robbery. This theft consisted of a number of […]

Continue reading

Identity Theft

A while ago I wrote a series of articles about theft in the modern age that provided an in-depth account on how malicious people were stealing using technology in the modern age. I recently came across a very interesting article by Jacqui Cheng on Ars Technica called “Learn how to protect yourself from identity theft” and thought […]

Continue reading

No MS09-048 patch for Windows XP and Windows 2000, what to do?

On September 8th Microsoft released its usual set of patches. One particular issue CVE-2009-1926 affects all Microsoft Windows platforms except for Windows 7 and Windows 2008 R2.However Microsoft neglected to issue a patch for the Windows XP and Windows 2000 platform. Microsoft took this decision consciously claiming that the code that required fixing is very […]

Continue reading

Using a 32bit COM object in a 64bit environment

A while ago I ran into a problem while working on a 64bit application. I needed to use a 32bit COM object in my 64bit application but alas that didn’t work. It seems that by default 32bit COM objects are not usable in a 64bit environment. Trying to access a 32bit COM in a 64bit […]

Continue reading

My PC might have a virus – what do I do?

One of the most common posts that you see in various forums is from people who suspect that their computer might be virus infected.  Posts such as, “My computer is crashing, do I have a virus?” or “I just got infected with a virus, what should I do?” are a clear indication that virus infection […]

Continue reading

21st Century Heists – Part 3

After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer exclusively about guns and taking people hostage, well at least not in the literal sense. […]

Continue reading

21st Century Heists – Part 2

We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming Technology has long played a part in most modern Hollywood movies, yet it’s not just […]

Continue reading