Articles

Hackers Exploit Stolen Firefox Bug Information
Mozilla is warning that at least one year ago, an attacker infiltrated the repository that it uses to log bugs pertaining to its Firefox browser, began stealing information relating to unpatched ...

Dangerous IE vulnerability opens door to powerful phishing attacks
An Internet Explorer vulnerability lets attackers bypass the Same-Origin Policy, a fundamental browser security mechanism, to launch highly credible phishing attacks or hijack users’ accounts on any ...

CTB Locker and Critroni Ransomware Information Guide and FAQ
CTB Locker (Curve-Tor-Bitcoin Locker), otherwise known as Critroni, is a file-encrypting ransomware infection that was released in the middle of July 2014 that targets all versions of Windows ...

Ransomware: how to remove it, even when the computer does not boot?
Malware very often adds itself to the list of applications that start when operating system boots up. By doing so, it makes sure that when a user removes it during the system run, it will infect the ...

Flame’s code injection techniques
Flame employs the most sophisticated system of code injections we’ve observed in malware. It distributes its elements throughout the OS processes using chains of up to three injections involving up ...

Anatomy of a Targeted Attack
We constantly deal with targeted attacks, and sometimes we are lucky enough to find the initial command and control mechanisms still live. On one malware response we found a piece of malware that was ...

Securing Your Web Browser
This paper will help you configure your web browser for safer internet surfing. It is written for home computer users, students, small business workers, and any other person who works with limited ...

Home Network Security
This document gives home users an overview of the security risks and countermeasures associated with Internet connectivity, especially in the context of 'always-on' or broadband access services (such ...

Spyware
This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it as a tool for crimes ...

Using Wireless Technology Securely
In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free ...

Virus Basics
A computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Some viruses are harmless, others ...

Before You Connect a New Computer to the Internet
This Tech Tip provides guidance for users connecting a new (or newly upgraded) computer to the Internet for the first time. It is intended for home users, students, small businesses, or any site with ...