Name search engines off the top of your head. Ready? Go! Google Search Bing Yahoo! Ask ... Did you run out of answers at 3 or 4? Google and Bing are obviously the big ones. Ask has some prominent promotions and their toolbar is linked into a lot of software. Here's two more search engines you should give a shot? DuckDuckGo Blekko Why should you consider different … [Read more...]
Shared database of cellphone carriers aims to deter phone theft
How easy is it for a phone to be lost or stolen? It's pretty darn easy. Just check out the video embedded after the jump of a thief waiting for just the right time to steal a phone and run. What if phones were worth less when stolen, or even worthless? Back in April, the FCC announced a plan to help devalue stolen phones by getting the multiple carriers out there to cooperate … [Read more...]
Malwarebytes Anti-Rootkit available in beta
Malwarebytes, developers of the popular anti-malware tool, have released a beta version of a new anti-rootkit tool. As we learned from the Malware Report that the Microsoft Malware Protection Center put out last month, rootkits have gone from being theoretical to practical to common. In my organization, I know I have seen plenty of malware infections and rootkits like the TDSS … [Read more...]
Google needs to get strict on the Chrome Web Store
Google consolidated their store fronts for books, movies, Android Apps, and even hardware into Google Play. What got left out in the cold is the Chrome Web Store, where you can install apps and games for the Google Chrome browser. Along with being left out, the Chrome Web Store also seems to get little attention from the company. Searching the Chrome Web Store, which has had … [Read more...]
Microsoft Malware Protection Center provides report on Rootkits
Rootkits have gone from theoretical to everyday infections in a pretty short time. Tools like TDSSKiller, Sophos Antirootkit, Combofix, and others all help in the battle against these sophisticated infections but the best solution is to avoid getting one installed in the first place. To better understand the threat that rootkits pose, I recommend reading the threat report that … [Read more...]