When time is “relative”
I was uninstalling some Microsoft software and was staring at the uninstaller astonished… for more than 10 minutes… until I said ENOUGH MICROSOFT !!! WASTE SOMEONE’S ELSE TIME and killed the damn process….
I was uninstalling some Microsoft software and was staring at the uninstaller astonished… for more than 10 minutes… until I said ENOUGH MICROSOFT !!! WASTE SOMEONE’S ELSE TIME and killed the damn process….
Protecting Your Code with Visual C++ Defenses by Michael Howard
A Windows Update is available to users who are located in member countries of the European Union allowing for choosing a different standard browser for the system. The update is available for download through Windows Update. Read more here: http://techblog.avira.com/2010/03/08/the-browser-choice/en/
Very interesting stuff: http://www.symantec.com/connect/blogs/viruses-and-digital-signatures Although the files are signed, they are signed using an unauthenticated CA (Certificate Authority) which is masquerading as Verisign. A CA is a trusted third party that issues and signs the certificate and vouches for the authenticity of the file. Each CA should be registered and therefore recognized globally as a […]
http://www.avira.com/en/company_news/avira_extends_security_in_the_cloud.html Avira extends Managed Security Services portfolio to offer users security “in-the-cloud” Tue, 02 March 2010 Avira’s acquisition of CleanPort forms the basis for the new business unit Tettnang/ Doetinchem, 2 March 2010 – German IT security provider Avira has acquired CleanPort, an acquisition that extends Avira’s solutions for terminals and server products with a […]
I published a new article in the Avira Techblog: Combined Avira Risk Level We now have a new risk indicator: Global This indicator combines the other 3 in the easiest way possible. One might argue that Malware is more important than phishing and spam. Maybe, but they are all treated equally in our system. This […]
The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or […]
I recently bought a new LCD TV from Philips : The 47″ PFL8404H/12 with NetTV. Philips 47 PFL 8404 H 119,4 cm (47 Zoll) Full-HD Ambilight LCD-Fernseher mit integriertem DVB-T / DVB-C Tuner schwarz Actually, I chose this TV because of two features it has: 1. The display : Full HD, 47″ , non reflective […]
After writing this article ( http://techblog.avira.com/2010/01/04/firefox-extension-updates/en/ ) and after Dirk’s info , it finally happened to Firefox: They published malicious plugins It was just a matter of time 😉 Short link
http://it-republik.de/php/news/Security-Hinweise-zu-Facebook-Anwendungen-und-mehr-053600.html Sorin Mustaca von Avira berichtet, dass Googles Chrome in Version 4 durch ‘Extensions’ erweitert werden kann, die von Google in der ‘Extension Gallery’ gesammelt und bereit gestellt werden – ohne ihre Funktionsfähigkeit oder Verhalten zu prüfen, so dass bösartigen Extensions Tür und Tor offen stehen. and the original article: http://techblog.avira.com/2010/01/27/google-chrome-4-now-with-extensions/en/
You must be logged in to post a comment.