This post is a bit of a public service announcement, so I’ll get right to the point:
Every time you use WiFi, ask yourself: could I be connecting to the Internet through a compromised router with malware?
It’s becoming more and more common to see malware installed not
Jon Galloway and I got into a heated debate a few weeks ago about the efficacy of anti-virus software. My position is that anti-virus software sucks, and worst of all, it doesn’t work anyway. That’s what I’ve been saying all along, and it’s exactly what I
Scott Wasson at The Tech Report notes that two of his family members fell victim to the eCard email exploit that has been making the rounds lately:
I just dropped off a package containing my dad's laptop at the FedEx depot this afternoon. I spent parts of several
The Ghost In The Browser: Analysis of Web-based Malware (pdf) describes how Google is leveraging their overwhelming search dominance to combat browser malware installations. In a blog entry last summer, Matt Cutts said:
Given how much I hate web pages that install malicious software or abuse browser security holes, I’