GOOGLE abandons Windows due to security reasons. It's really quite simple. But if enough Microsoft people (e.g. former staff) manage to enter news sites, then "news" becomes just agenda-filled propaganda. That's what happened in the BBC, which we call the MSBBC. Not too surprisingly, Microsoft's Bought Bot and MSBBC, which loves to post FUD about Android every time someone is able to do something to break it (we covered just one such example recently even though there are more), are at it again. In order to fight the perception that Windows is insecure by design (which it is, even by Microsoft's own admission) they try to paint other platforms as "inseucre", by improperly naming malware "virus" or something along those lines. This usually requires that the user should be actually be installing it (not drive-by), in which case the software is granted permission to do exactly what it was designed to do.
Yes. It’s true. For the first time, Mac users have a significant malware problem. But, hey, it could be worse. You could be running Windows. After all, Microsoft, not some third-party anti-virus company trying to drum up business, has just admitted that based on analysis gained from IE 9 use, “1 out of every 14 programs downloaded is later confirmed as malware.”
If I may quote from Matthew 7:5, the King James Bible, “First cast out the beam out of thine own eye; and then shalt thou see clearly to cast out the mote out of thy brother’s eye.”
Window PCs has far, far more malware trouble than Macs, and I can’t resist mentioning that after in twenty-years of Linux, we’ve not seen a real-world example of Linux malware–not counting the Android malware mess. Ironically, these latest appalling Windows malware numbers are shared in a Microsoft blog about how well SmartScreen Application Reputation is working in IE9.
The Department of Energy's largest science and research lab in Tennessee is still recovering from a sophisticated attack from hackers intent on stealing information from the lab in early April.
The attack left the lab in a communications limbo for two days as technicians dealt with its aftermath.
"Most of the staff are back up, and the business functions are performing as usual," said Barbara Penland, the Oak Ridge National Laboratory's director of communications. "But as you can imagine, when we were trying to get everything back up in a hurry, there were some shortcuts taken, and now the IT folks are rebuilding things in the background, and building some things that will make us more secure."
To deal with the attack, Oak Ridge lab's technicians had shut down access to its e-mail systems and some of its servers for more than 48 hours. They found that it was an attack that relied on a combination of social engineering and an unknown security hole in Microsoft's Internet Explorer browser. ... the attack is noteworthy because it was clearly an attempt to steal information from a facility that is at the heart of America's materials, national security and energy research. ...
The characteristics of the this latest attack also appear similar to those used in the widely-publicized SecurID phishing attack, which compromised the computer security company RSA's widely-used product. In the RSA attack, a malicious Flash object in a scam Excel file was used to infect recipients' computers with malicious computer code.