Malware may hide behind long names in Windows registry

Malware may hide behind long names in Windows registry

Security experts have found a vulnerability in the Windows operating system that could allow malware to lurk undetected in long...

August 30th, 2005 Elizabeth Montalbano

Something phishy going on

Something phishy going on

The old saw has it that “there’s a sucker born every minute.” But the circus carnies in P.T. Barnum’s time...

September 29th, 2004 Richard Bray

Defense lessons learned the hard way

Defense lessons learned the hard way

A research company in the financial services field recently discovered that it takes only one unethical person to single-handedly cause...

April 30th, 2002 Susan Maclean

IE hole can be used to open a ‘back door’

IE hole can be used to open a ‘back door’

An attacker could trick a user of Microsoft Corp.'s Internet Explorer (IE) Web browser into downloading and running a malicious...

December 14th, 2001 Joris Evers

IE hole can be used to open a ‘back door’

IE hole can be used to open a ‘back door’

An attacker could trick a user of Microsoft Corp.'s Internet Explorer (IE) Web browser into downloading and running a malicious...

December 12th, 2001 Joris Evers