Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Search Results for: apple app


Browsers tested for phishing and social engineering malware

Browsers tested for phishing and social engineering malware

on August 14, 2009

NSS Labs has posted the results of its testing of the big six browsers for their ability to repel social engineering malware and phishing attacks. “The results are based upon empirically validated evidence gathered by NSS Labs during continuous 24×7 …

Read the Full Story
0
Back from my travels and it’s darned cold

Back from my travels and it’s darned cold

on February 5, 2009

I spent most of last week in the UK to do the launch of the UK VIPRE, and this week, was a presenter at the Florida Venture Capital Conference. Now back in Tampa, and the weather is expected to hit …

Read the Full Story
0
Leopard looking for a new home

Leopard looking for a new home

on January 31, 2009

Leopard (not to be confused with the Apple OS) is a really interesting program language for kids developed by Brandon Watts. It uses extremely simple methods to create highly complex programs, very useful for teaching the basics of programming to …

Read the Full Story
0
Poser poses as Posner

Poser poses as Posner

on January 19, 2009

(Malvertisements are Flash ads that have been modified to redirect to a malware site. A malware author takes an ad (often a legitimate one) and then embeds malicious URLs into it, and then attempts to place the ad on various …

Read the Full Story
0
Spam as visual poetry

Spam as visual poetry

on September 3, 2008

A new campaign currently running.  While it perhaps looks like visual poetry (inspired by Augusto de Campos?), it’s a cute trick to bypass filters.   If you select the text, you see something else: So, “Special Offers for Viagra and Cialis” …

Read the Full Story
0

on September 2, 2008

Yup: The TSA is tightening its photo ID rules at airport security. Previously, people with expired IDs or who claimed to have lost their IDs were subjected to secondary screening. Then the Transportation Security Administration realized that meant someone on …

Read the Full Story
0
Hardening a Mac

Hardening a Mac

on June 3, 2008

Apple just released a rather tome-like document on securing Leopard. It’s a good document, albeit certainly for the more advanced Mac user or system administrator. Link here (pdf). On a related note, the CIS security documentation for Leopard was released …

Read the Full Story
0
More on the Apple Safari/Windows blended threat

More on the Apple Safari/Windows blended threat

on June 2, 2008

If you’re a bit confused about the recent Microsoft advisory on the Safari blended threat, you’re probably not the only one. Microsoft’s advisory speaks of a threat that “allows remote code execution”. However, if you review the work of Nitesh …

Read the Full Story
0
Apple’s Safari problem

Apple’s Safari problem

on June 1, 2008

You’ve probably heard of the current problem with Safari running under Windows. It’s basically a trivial method to “carpet bomb” a users desktop (or other folder) with files. Now, as far as I can tell, it’s not a way to …

Read the Full Story
0
The long tail of phishing

The long tail of phishing

on May 28, 2008

Phishers are going after all kinds of odd-and-ends these days.  What’s happened is that the big guys (Chase, Bank of America, Paypal, etc.) have been phished to death.  The phishers are looking around for any new stuff. For quite a …

Read the Full Story
0