Friday, April 21, 2006

False Blog Virus Does Indicate Blogging Threat

There is a false virus for blogs which is beginning to cause confusion among blog writers and readers.

This supposed 'malicious code', discovered last January, is simply a joke created by a Dutch author which suggests inserting an animated graphic in blogs.

The graphic is a picture of a virus that makes a series of comments, such as how it intends to dominate the blogs around the world.

PandaLabs reminds users that even though this 'virus' poses no threat, there is a possibility that by exploiting the impact of this joke on many blogs, the same technique might be used to spread genuinely damaging malicious code.

To avoid such possible problems, PandaLabs advises users not to insert references to third-party code on personal web pages, even if they are simply jokes.

For those who want to insert items from other sites, it is important to ensure that no calls are made to remote servers and that the content is hosted on the author's server.

According to Luis Corrons, "the malware situation is currently quite delicate, as complex social engineering techniques are frequently used and it is possible that malicious code could be spread involuntarily among circles of blog writers exchanging information."

Thursday, April 20, 2006

Apple OS X Java VM Security Update

Apple has released Java 2 Standard Edition (J2SE) Release 4 for Mac OS X v10.4.5. As well as the performance and compatibility improvements it includes, this update also resolves several vulnerabilities in the virtual Java machine.

One of the advantages of Java applets is that they are multi-platform, as their precompiled code is parsed by the virtual machine, independently from the hardware or operating system used.

What's more, to prevent damaging or unsolicited actions, the virtual Java machine establishes a closed environment, known as a 'sandbox' that blocks indirect and indiscriminate access to system resources, such as arbitrary writing to files.

The vulnerability corrected by this update could allow an untrusted Java applet to elevate its privileges, carrying out actions that is should not be able to carry out, such as reading and writing to files or executing local applications.

Sun Microsystems has publish an alert notification about these vulnerabilities, which is available at http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1

The new version J2SE 5.0 Release 4, which corrects the problems in Mac OS X v10.4.5 has been published by Apple and can be downloaded from http://www.apple.com/support/downloads/

Wednesday, April 19, 2006

Oracle Fixs 30 Security Flaws

In line with its policy to release updates every quarter, Oracle offers several updates that resolve multiple vulnerabilities in its products.According to the advisory released by Oracle, the updates correct over 30 security flaws in the products in the Oracle range.

The full list of products affected by the security problems and additional information are available in the advisory published by Oracle at http://www.oracle.com/technology/deploy/security/pdf/cpuapr2006.html

Many of the security problems are critical, as they could allow access and modification of confidential data or control of the system.

According to Oracle, certain conditions, such as run permissions or a valid session, are required in order to successfully exploit many of these vulnerabilities.

Due to the high number of security flaws resolved and the severity of some of these vulnerabilities, we recommend all users of affected products to refer to the Oracle advisory and install the corresponding updates as soon as possible.

Tuesday, April 18, 2006

Military Secrets For Sale In Afghan Bazaar

Stolen computer drives containing classified military assessments of enemy targets, names of corrupt Afghan officialsand descriptions of American defenses are on sale a local bazaar in Bagram, according to information provided by www.latimes.com.

The owners of the shops claims that Afghan cleaners, garbage collectors and workers from a military base offer them a wide range of goods, flashmemory included.

These drives are sold as second-hand goods. The drivesc ould include data on military actions, Social Security numbers and other military personnel information.

As portable storage devices are particularly susceptible to loss or theft, we recommend that all sensitive information should be encrypted or stored in other storage devices with greater security.

Monday, April 17, 2006

Zone Alarm by Zone Labs

Zone Alarm Overview

Zone Alarm by Zone Labs is the top-rated personal firewall. Zone Alarm has consistently won every top award from PC Magazine, CNET, PC World, Wired Magazine and others since 2000.

Zone Alarm Pro is their top of the line firewall offering.

Zone Alarm Pro provides complete PC security to novice and experienced users alike.Zone Labs offers a free version of ZoneAlarm as well as the Pro version.

There is also a Zone Alarm Security Suite that includes anti-virus protection and addditional system security features and capabilities.

You can also purchase other security products from Zone Labs such as Pest Patrol or Cloudmark's SpamNet offerings. Special Zone Alarm Pro bundles include substantial discounts or rebates on the additional products and on Zone Alarm Pro itself.

At various times, Zone Labs offers special promotional discounts on Zone Alarm Pro.

The standard price of $49.95 may be reduced by $10, $20 or even as much as $30.

The best way to search for these special rebates on Zone Alarm Pro is to check a non-menu page at Zone Labs that lists all the current special promos.

Click here to browse all the Zone Alarm specials.

Sunday, April 16, 2006

Adware Removal Tips

Adware Removal Tips

The key to adware removal is using a quality program with updated definition files.

Adware removal is difficult if you're using a free software download that doesn't include all the latest threats. At present, there are more than 67,000 adware removal definitions in the top programs.

Most of the free downloads have search files with roughly 30,000 definitions.If you're serious about removing ad-ware and spyware, then you want the best adware removal program, not a free download.

The best product for ad-ware removal is No Adware.

Important features in tools for ad-ware removal include:
Automatic update of pest control definition files
Scheduled scans for adware removal
Scan on the fly - search files or downloads for hidden pests
Free trial download - Try it out for freeNo Adware has these features and more, plus you can try it for free.

Click here for Adware removal.

Use the free trial option to see how effective No Adware is at removing every type of ad-ware pest. No Adware really is the best tool for ad-ware or spyware removal. Try it for free and see for yourself right now.

Click here for Free Adware Removal.

Here's a quick recap of the ad-ware removal features:
Largest definition file - Keeps you safe
Automatic updates - Keeps you current
Auto scan option - Set and forget - No worries
Custom scan option - Search entire drive or just a folder
Automatic backups - Allows full system restore if needed
Extensive customer support - Help is always available

You know you need a good ad-ware removal solution.You can try No Adware for free. Go ahead and try it.

Decide for yourself if it's what you need.

Click here for the best Adware solution.