Support Our Site
Get Better Gear!
- Notability For iPad: Much More Than A Note Taking App from Ginger Labs, Inc, US$0.99
- Scosche’s RH656m Headphones With Microphone Are Wonderful from Scosche, US$129.99
- IPEVO’s Typi Folio Case & Keyboard for iPad is First-rate from IPEVO, US$79.99
- Scosche’s boomSTREAM BT Speaker: Features & Compromises from Scosche, US$99.95
- FX Photo Studio HD: iPad Painting of Effects Made Easy from MacPhun LLC, US1.99
Top 5 Free Apps
iTunes New Music Releases
Top 5 Paid Apps
Discover New Music
- Jeff Wayne
- With the new movie adaptation of H.G Wells' classic Sci Fi invasion tale, War of the Worlds, currently on theater screens everywhere, there's new interest in Jeff Wayne's rock opera version, and it is
- Prefuse 73
- It's an album about a breakup, done with beats instead of mopey lyrics. But the beats are raw, and the emotions are there, even if there aren't many words on top of it. While possibly not Scott Herren
- Bumblebeez 81
Part white rap, part alternative, part pop, and part rock, the Bumblebeez grabbed a hold of me with "Pony Ride," and didn't let go.
This group does a marvelous job of moving seamlessly be
- Led Zeppelin
- This album bears every flavor of genius from the five records that came before. It is, I believe, the band's finest. With Physical Graffiti, Zep came raging back to their musical home territory -- har
- Alanis Morissette
- Ten years after the original release, comes the traditional celebratory acoustic re-recording. The album has held up remarkably well. While it is not as meaningful to me as it was when I was sixteen,
Reader Specials
Visit Deals On The Web for the best deals on all consumer electronics, iPods, and more!
News
E-mail iPhone Scam Exploits Windows
Sunday, July 1st, 2007 at 4:00 PM - by John Martellaro
Secure Computing warned of a e-mail scam on Sunday that tries to seduce readers with a promise of a free iPhone, and then directs them to a Website that exploits over 10 ActiveX vulnerabilities in Windows.
The site uses some fairly sophisticated techniques according to Paul Henry, VP of technology evangelism at Secure Computing.
"This threat is particularly insidious in that scripts within the HTML code returned to the user contain exploit code for multiple vulnerabilities to improve the malicious hackers chances of gaining the necessary access to install the rootkit /spam bot malware," he said.
He added, "While most organizations fully inspect the traffic directed to their Internet facing web servers, many do not inspect the traffic that is returned to their internal users when visiting Internet web sites."
The effect of the vulnerability is to turn the PC into a spam-sending botnet. However, because it installs a rootkit, it would be fairly simple, Mr. Henry said, to "update the malware to include other nefarious tasks, such as key logging on the compromised PC to capture the users financial credentials for use in ID theft."
The Macintosh was not cited as vulnerable.
Recent Headlines
- Reading, Writing, & Saving the World
- Free Retro Gaming for iOS - Activision’s Kaboom!
- Apple Adds Chomp Bits to iOS 6 App Store Discovery
- Notability For iPad: Much More Than A Note Taking App
- Scosche’s RH656m Headphones With Microphone Are Wonderful
- Tim Cook & Larry Page Reportedly Discuss Patents
- Analysis: Amazon Kindle Fire Sold Out, Kindle Fire 2 Pic Leaked
Post Your Comments