PA Attorney General Corbett cautions consumers about job-search emails requesting credit report information HARRISBURG – Attorney General Tom Corbett today cautioned Pennsylvania job-seekers to be extremely cautious about Internet employment offers that ask applicants to email copies of their personal credit reports. “Credit reports contain a wealth of background information about consumers, including social security [...]
Beijing, China — The Chinese government has ordered PC (personal computers and laptops) makers to install Green Dam Youth Escort filtering software as of July 1. Representatives claim it is to prevent youth from viewing pornography on the Internet; however, independent analysis of the software revealed it blocked political content the government deemed unacceptable. In [...]
A massive phishing scam similar to the recent bank fraud scams is being sent in emails that look like the following: From: “Microsoft Customer Support” Subject: Update for Microsoft Outlook Critical Update Update for Microsoft Outlook / Outlook Express (KB910721) Brief Description Microsoft has released an update for Microsoft Outlook / Outlook Express. This update [...]
Alert — There is a massive new bank fraud phishing scam being conducted via email. The website address that appears in the body of the email looks valid; however, if you view the source, you will see a bogus domain name. Clicking on the link will take you to an unauthorized website. Should you receive [...]
Microsoft has released an update to address vulnerabilities in Microsoft Windows, Office, and Internet Explorer as part of the Microsoft Security Bulletin Summary for June 2009. These vulnerabilities may allow an attacker to execute arbitrary code, operate with elevated privileges, or obtain sensitive information.
Apple has released Safari 4.0 for Windows and Mac OS X to address multiple vulnerabilities in CFNetwork, CoreGraphics, ImageIO, International Components for Unicode, libxml, Safari, Safari Windows Installer, and WebKit. These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, obtain sensitive information, bypass security restrictions, or conduct cross-site scripting attacks.
1. Protect your personal information. It’s valuable. 2. Know who you’re dealing with. 3. Use security software that updates automatically. 4. Keep your operating system and Web browser up-to-date, and learn about their security features. 5. Protect your passwords. 6. Back up important files. 7. Learn what to do in an e-mergency. Access to information [...]
Android is an open source operating system that was originally developed by Google for use on cell phones and mobile devices. Acer has announced that Android will be used on their new netbooks. The good news is that Android is distributed for free and is improved upon by the open source community. This will give [...]
Apple Releases iTunes 8.2 and QuickTime 7.6.2 Apple has released iTunes 8.2 and QuickTime 7.6.2 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition. US-CERT encourages users to review Apple articles HT3592 and HT3591 and apply any necessary updates to help mitigate the risks. Available [...]
Research In Motion has released security advisory KB18327 to address multiple vulnerabilities in the PDF distiller of the BlackBerry Attachment Service. By convincing a user to open a specially crafted PDF file on a BlackBerry smartphone, an attacker may be able to execute arbitrary code on the computer hosting the BlackBerry Attachment Service. US-CERT encourages [...]