No Image

Security tips for safe online shopping

During the holidays season many people receive packages from the post or delivery services. We wrote about the dangers introduced by opening attachments in emails pretending to come from such entities. Without an active and up to date security software, attachments in email should never be open, no matter from where they come. We also recommend that consumers watch for a few things in order to not become a victim of the online fraudsters: – If you connect to the Internet via a WiFi, make sure it is encrypted – If you connect to the webshop via a mobile device like a tablet or smartphone, make sure that the website reacts correctly to touch. Not all website allow an easy usage via such interfaces. You don’t want to order 10 items instead of one, or press cancel instead of proceed after you searched for hours the right product. – If you don’t know the website you plan to buy from, always check its reputation. Search for other users who are commenting about that website. Searching for “<website> reputation” usually gives good and relevant results. – Always check that the connection to the online store where the payment is done is secured….

No Image

Next C++ generation: C++11

Introducing C++11: Next iteration of programming language passes review ( — This past week in Madrid, Spain, the next iteration of the C++ programming language, C++11, passed review by the technical standards committee. “The new standard provides language features that make it easier to write correct and well-performing code in C++ together with more standard libraries. For example, C++11 provides facilities for writing concurrent code (e.g. for multicore machines) in a type safe-manner. The improved language facilities are focused on allowing better specification and use of abstractions (classes and templates). Examples are a more efficient way of getting results out of functions (move semantic), better facilities for object initialization, and a simpler for loop. Examples of new library components are hash tables, threads, and regular expression matching.”

No Image

Avert Labs — Malware “Experience” – DON’T

With a huge surprize I’ve read here that McAfee is teaching people how to play with Malware. I do not think that everybody needs to know this. Already too many script kiddies are doing this with catastrophic effects. Avert Labs — Malware Experience (By appointment only) Tuesday, Oct. 6 1:00 pm – 5:00 pm You’ve often heard that the Internet is a dangerous place and you’ve probably read about threats such as botnets, keystroke loggers and drive-by installations of malware through rigged Web sites. But what is malware really? How do cybercriminals launch their malicious attacks? McAfee is offering you the chance to find out with the unique and exclusive McAfee Malware Experience. Join experts from McAfee Avert Labs and have a chance to work with a Trojan horse, commandeer a botnet, install a rootkit and experience first hand how easy it is to modify websites to serve up malware. Of course this will all be done in the safe and closed environment, ensuring that what you experience first hand doesn’t actually go out onto the Internet. To sign up, contact Shiva Mandalam at or 408.346.3866. McAfee, do not consider that just by using a “safe environment” the…

%d bloggers like this: