by Joseph Forbes | Dec 31, 2012 | Blog Entry
1. Breaking a Post Down into a List In case you don’t remember, I wrote a post not too long ago about why the masses enjoy lists so much. That was obviously a sarcastic article, but the basic principle that people like lists is true. Lists are concise, they keep the...
by Joseph Forbes | Dec 30, 2012 | Malware Reports, SECURITY
Description: An encoded javascript (or a redirection to it) was detected, leading browsers to the Blackhole Exploit kit (v1.x). It attempts to exploit the browser of anyone visiting the site using a combination of multiple vulnerabilities (Java, Adobe PDF, Flash and...
by Joseph Forbes | Dec 30, 2012 | Blog Entry, INTERNET, SECURITY, Technical Support
As an official patch is yet to become available, Microsoft has released a temporary Fix-it tool to close a critical security hole in its Internet Explorer web browser. According to a blog post by Yunsun Wee, Trustworthy Computing Director at Microsoft, the company...
by Joseph Forbes | Dec 30, 2012 | Blog Entry, INTERNET
Stopping Spambots with hashes and honeypots Spam sucks. Any site which allows unauthenticated users to submit forms will have a problem with spamming software (spambots) submitting junk content. A common technique to prevent spambots is CAPTCHA, which requires people...
by Joseph Forbes | Dec 30, 2012 | Blog Entry, HACKING, INTERNET, SECURITY
Critical zero-day hole in Internet Explorer – Update While analysing a compromised web page, security experts from FireEye discovered malware that exploits a previously unknown security hole in Internet Explorer. The hole allows attackers to inject malicious...