Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code Execution

/
Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code Execution: Microsoft is investigating reports of limited, targeted attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. This advisory contains information about which versions of Windows are vulnerable as well as workarounds and mitigations for this issue.

Spyware: The New Annoying Threat

/
So what is this spyware? Spyware is software that collects personal information from your computer without your knowledge of the occurring event. Information gathered from spyware ranges from the collection of all web-browsing activities to collecting sensitive information like usernames, passwords, address and even your social security number. Spyware has the ability, when installed, to modify system settings, which perform undesirable tasks on your computer system. Furthermore, spyware has been known to redirect user’s web browsers, cause computers to dial services for which they are billed and install DLLs and other executables files to send your personal data to another computer. This is done by using the computer's memory resources and also by utilizing bandwidth, as it sends information back to the spyware's home server via the user's Internet connection. Because the spyware program is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Automated Log Management and Analysis using Splunk for Computer Incident Investigations

/
Splunk - I define “Log Analysis” as a process of collecting system logs (syslog) and event data from computer systems, network devices and applications to look for anomalous events that are malicious or are in violation of organizational policies.

Personal Security on Social Networking Sites

/
Visits to social networking sites account for more than 10% of the total time people spend on the Internet, according Nielsen Online. A social network site focuses on building online communities of people who share common interests and activities, such as Linkedin.com and Facebook.com. Facebook is now the most visited social networking site on the Internet, with nearly 1.2 billion visits in January 2009 alone, while Twitter and Linkedin are steadily gaining ground.

Microsoft Security Bulletin Summary for July 2010

/
This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message.

Microsoft’s Next Move for Windows – Samara Lynn

/
Microsoft has bounced back into good grace from Windows Vista with its latest release of its operating system, Windows 7. Many Windows-based users have adopted Windows 7, either upgrading from Windows XP or scraping Vista. In an interesting article titled, “Will Windows 8 Be A Business-Only OS?” from PC Mag, Samara Lynn discussing Microsoft’s potential next move.