<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-563830927818572402</id><updated>2020-04-25T23:07:17.605+02:00</updated><category term="Security News"/><category term="vulnerability"/><category term="Hacking News"/><category term="Giveaway"/><category term="Internet Security"/><category term="AV-Test Reports"/><category term="Malware"/><category term="security tool"/><category term="AV-Comparatives"/><category term="Windows 8"/><category term="Anonymous"/><category term="Antivirus software"/><category term="Phishing Scam"/><category term="Spam"/><category term="defaced"/><category term="exploit"/><category term="passwords"/><category term="security"/><category term="twitter"/><category term="win32k.sys"/><category term="windows 7"/><category term="2012"/><category term="AES-256"/><category term="AV-TEST"/><category term="Amazon"/><category term="Anti-Virus Performance Test"/><category term="AntiSec"/><category term="Backdoor.Sykipot"/><category term="DNS"/><category term="DNS cache poisoning"/><category term="DNSCrypt"/><category term="Facebook"/><category term="Firefox"/><category term="Flash Player"/><category term="Ghostery"/><category term="Google"/><category term="Googlebot"/><category term="Internet"/><category term="Internet Explorer"/><category term="Malware removal test"/><category term="Memory Corruption"/><category term="Microsoft SafetyScanner"/><category term="OpenDNS"/><category term="PayPal"/><category term="Web Services"/><category term="Whole Product Dynamic Test"/><category term="Windows"/><category term="Windows Defender"/><category term="Yahoo Mail"/><category term="Zeus Bot"/><category term="blackhole"/><category term="bot"/><category term="cyberwar"/><category term="hacker"/><category term="iSpy"/><category term="java"/><category term="kaspersky"/><category term="logon"/><category term="malware scanner"/><category term="new tech"/><category term="open-redirect"/><category term="phishing"/><category term="rootkit"/><category term="scam"/><category term="social networks"/><category term="spyware"/><category term="system tweak"/><category term="website security"/><category term="worm"/><title type='text'>LEVEL Security</title><subtitle type='html'>Computer Security blog - daily updated news, articles, reviews on security and safety.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>44</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-4982037238715638494</id><published>2011-12-27T17:10:00.000+01:00</published><updated>2011-12-27T17:10:13.724+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2012"/><category scheme="http://www.blogger.com/atom/ns#" term="new tech"/><title type='text'>51 Items on an Admin’s Wish List for 2012</title><content type='html'>   With the New Year, it is time to start putting together our admin’s wish list for 2012. Anything goes for this list – new hardware or software for work, changes to procedures or offerings from vendors, geeky gadgets, and future tech.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/51-items-on-admins-wish-list-for-2012.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/4982037238715638494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/51-items-on-admins-wish-list-for-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4982037238715638494'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4982037238715638494'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/51-items-on-admins-wish-list-for-2012.html' title='51 Items on an Admin’s Wish List for 2012'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-3561862634605189245</id><published>2011-12-27T16:53:00.000+01:00</published><updated>2011-12-27T16:53:45.335+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Play Hard, Stay Safe</title><content type='html'>   You might think that you don&amp;#39;t have to worry about security while playing games--after all, that activity is about as far from online banking as you can get--but as the PlayStation Network data breach last spring and the more recent hack into the servers of the Steam gaming platform both show, you are vulnerable, even when you&amp;#39;re at play.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/play-hard-stay-safe.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/3561862634605189245/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/play-hard-stay-safe.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3561862634605189245'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3561862634605189245'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/play-hard-stay-safe.html' title='Play Hard, Stay Safe'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-3799689055880404696</id><published>2011-12-26T10:51:00.000+01:00</published><updated>2011-12-26T10:51:38.668+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="twitter"/><title type='text'>&#39;Anonymous&#39; hackers target US security think tank</title><content type='html'>   Anonymous is claiming to have stolen 200GB worth of data, including e-mails and clients&amp;#39; credit card information, from a U.S.-based security think tank, the Associated Press reported today.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/anonymous-hackers-target-us-security.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/3799689055880404696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/anonymous-hackers-target-us-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3799689055880404696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3799689055880404696'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/anonymous-hackers-target-us-security.html' title='&#39;Anonymous&#39; hackers target US security think tank'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-2600331636451542365</id><published>2011-12-25T18:36:00.000+01:00</published><updated>2011-12-25T18:36:24.000+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antivirus software"/><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><title type='text'>Dr.Web Security Space &amp; Dr.Web Anti-virus Pro 7.0 Free 3 Months Serial Number Giveaway</title><content type='html'>   Doctor Web is a Russian IT-security solutions vendor developing Dr.Web anti-virus for businesses, government entities, and personal use. Before purchasing a license to any Doctor Web product, interested users can download the trial version to test the software to see if it is worth buying. Like other security software, the official Doctor Web website usually provides free trial for one month only, but there is a promotion offer to get a free copy of Dr.Web Security Space Pro 7.0 &amp;amp; Dr.Web Mobile Security Suite that protect you for 3 months.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/drweb-security-space-drweb-anti-virus.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/2600331636451542365/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/drweb-security-space-drweb-anti-virus.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2600331636451542365'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2600331636451542365'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/drweb-security-space-drweb-anti-virus.html' title='Dr.Web Security Space &amp; Dr.Web Anti-virus Pro 7.0 Free 3 Months Serial Number Giveaway'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-7653673920307042040</id><published>2011-12-25T16:36:00.000+01:00</published><updated>2011-12-25T16:36:54.142+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="system tweak"/><title type='text'>IObit Advanced SystemCare PRO 4 for Free Giveaway</title><content type='html'>   &lt;b&gt;Advanced SystemCare PRO&lt;/b&gt; provides an always-on, automated, all-in-one PC Healthcare Service with anti-spyware, privacy protection, performance tune-ups, and system cleaning capabilities. This powerful and award-winning precision tool fixes stubborn errors, cleans out clutter, optimizes Internet and download speeds, ensures personal security, and maintains maximum computer performance automatically.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/iobit-advanced-systemcare-pro-4-for.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/7653673920307042040/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/iobit-advanced-systemcare-pro-4-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/7653673920307042040'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/7653673920307042040'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/iobit-advanced-systemcare-pro-4-for.html' title='IObit Advanced SystemCare PRO 4 for Free Giveaway'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-8788850642240775881</id><published>2011-12-25T14:47:00.000+01:00</published><updated>2011-12-25T14:47:01.864+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bot"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="twitter"/><title type='text'>Be aware of “Profile me” bot on Twitter</title><content type='html'>   Kaspersky Lab Experts are monitoring “Profile me” bot on Twitter. What is happening is “profile me” bot is exploring all Twitpic hosted pictures replying to the authors with the same text phrase.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/be-aware-of-profile-me-bot-on-twitter.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/8788850642240775881/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/be-aware-of-profile-me-bot-on-twitter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8788850642240775881'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8788850642240775881'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/be-aware-of-profile-me-bot-on-twitter.html' title='Be aware of “Profile me” bot on Twitter'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-3358929096525869766</id><published>2011-12-25T13:49:00.000+01:00</published><updated>2011-12-25T13:49:51.684+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="security tool"/><title type='text'>IObit Malware Fighter 1.2 PRO Giveaway (Christmas Gift)</title><content type='html'>   &lt;b&gt;Obit Malware Fighter&lt;/b&gt; is a straightforward antispyware tool that can protect your PC in several different ways.&lt;br&gt;&lt;br&gt;   For example, you can run an on-demand scan to look for spyware, adware, trojans, bots, and other threats that your regular antivirus software might have missed. The &amp;quot;Smart Scan&amp;quot; checks only the most critical areas of your PC, and runs fairly quickly (around 7 minutes on our test PC); you can run a complete system scan if you prefer, while the &amp;quot;Custom Scan&amp;quot; allows you to choose exactly what you&amp;#39;d like the program to examine.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/iobit-malware-fighter-12-pro-giveaway.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/3358929096525869766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/iobit-malware-fighter-12-pro-giveaway.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3358929096525869766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3358929096525869766'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/iobit-malware-fighter-12-pro-giveaway.html' title='IObit Malware Fighter 1.2 PRO Giveaway (Christmas Gift)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-795093066605594490</id><published>2011-12-23T21:46:00.000+01:00</published><updated>2011-12-23T21:46:57.188+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="win32k.sys"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 7"/><title type='text'>Microsoft confirms Windows vulnerability</title><content type='html'>   Microsoft has posted on its German-language Chief Security Advisor Blog about the Windows vulnerability reported &lt;a href=&quot;http://level-security.blogspot.com/2011/12/new-windows-7-vulnerability.html&quot;&gt;last Tuesday&lt;/a&gt;. The post states that the company was able to reproduce a situation in which a specially crafted HTML page could cause a blue screen when opened with Safari on a 64-bit system.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/microsoft-confirms-windows.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/795093066605594490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/microsoft-confirms-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/795093066605594490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/795093066605594490'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/microsoft-confirms-windows.html' title='Microsoft confirms Windows vulnerability'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-4084448206447429940</id><published>2011-12-23T21:38:00.000+01:00</published><updated>2011-12-23T21:38:54.294+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AES-256"/><category scheme="http://www.blogger.com/atom/ns#" term="Backdoor.Sykipot"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>PDF Malware Protected by AES-256</title><content type='html'>   Adobe Systems released a security update for Adobe Acrobat and Reader 9.x for Windows on December 16, 2011, in order to fix a zero-day vulnerability. As Vikram Thakur reported recently, there have been zero-day attacks using this PDF vulnerability, dropping &lt;b&gt;Backdoor.Sykipo&lt;/b&gt;t on to the compromised computer.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/pdf-malware-protected-by-aes-256.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/4084448206447429940/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/pdf-malware-protected-by-aes-256.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4084448206447429940'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4084448206447429940'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/pdf-malware-protected-by-aes-256.html' title='PDF Malware Protected by AES-256'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-1581885130772907844</id><published>2011-12-23T00:11:00.003+01:00</published><updated>2011-12-23T11:03:33.556+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AV-Comparatives"/><category scheme="http://www.blogger.com/atom/ns#" term="AV-Test Reports"/><category scheme="http://www.blogger.com/atom/ns#" term="Whole Product Dynamic Test"/><title type='text'>AV-Comparatives Whole Product Dynamic Tests - Overall Report 2nd half year 2011</title><content type='html'>The top six products in the AV-Comparatives  &amp;quot;Whole Product Dynamic Real World Test” for November were Symantec, Bitdefender, Kaspersky, Qihoo, F-Secure and G DATA.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/av-comparatives-whole-product-dynamic.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/1581885130772907844/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/av-comparatives-whole-product-dynamic.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1581885130772907844'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1581885130772907844'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/av-comparatives-whole-product-dynamic.html' title='AV-Comparatives Whole Product Dynamic Tests - Overall Report 2nd half year 2011'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-2932563556116876981</id><published>2011-12-22T20:40:00.000+01:00</published><updated>2011-12-22T20:40:21.100+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="kaspersky"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>Medium severity vulnerabilities found in Kaspersky softwares</title><content type='html'>   Medium severity vulnerabilities are found in Kaspersky Anti-Virus and Kaspersky Internet Security 2011/2012 which can allow an attacker to crash the complete software process.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/medium-severity-vulnerabilities-found.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/2932563556116876981/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/medium-severity-vulnerabilities-found.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2932563556116876981'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2932563556116876981'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/medium-severity-vulnerabilities-found.html' title='Medium severity vulnerabilities found in Kaspersky softwares'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-5014830195752877103</id><published>2011-12-21T21:40:00.000+01:00</published><updated>2011-12-21T21:40:48.198+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Firefox"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><title type='text'>Critical holes in Firefox, Thunderbird and SeaMonkey</title><content type='html'>   The Mozilla developers have not only given the Firefox browser a faster JavaScript engine with their update to version 9.0 but they have also closed various critical security holes. One critical flaw in previous versions of the browser allows an embedded OGG video element of &amp;quot;extreme&amp;quot; size to cause a crash that can potentially be exploited to inject malicious code. However, Mozilla is currently keeping the specific details of this confidentially disclosed vulnerability under wraps.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/critical-holes-in-firefox-thunderbird.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/5014830195752877103/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/critical-holes-in-firefox-thunderbird.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/5014830195752877103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/5014830195752877103'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/critical-holes-in-firefox-thunderbird.html' title='Critical holes in Firefox, Thunderbird and SeaMonkey'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-672707178911589991</id><published>2011-12-21T21:00:00.000+01:00</published><updated>2011-12-21T21:00:47.067+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing Scam"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>iPhone 4S Scam and Other Holiday Threats</title><content type='html'>   Trend Micro researchers have recently spotted fake eBay pages offering the latest incarnation of Apple&amp;#39;s popular iPhone for more that half the real price.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/iphone-4s-scam-and-other-holiday.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/672707178911589991/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/iphone-4s-scam-and-other-holiday.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/672707178911589991'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/672707178911589991'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/iphone-4s-scam-and-other-holiday.html' title='iPhone 4S Scam and Other Holiday Threats'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-3977993701153900520</id><published>2011-12-21T00:48:00.000+01:00</published><updated>2011-12-21T00:48:30.923+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><title type='text'>Agnitum Outpost Security Suite Pro 7.5.1 - 1 Year [Giveaway]</title><content type='html'>Agnitum is proud to provide complete official documentation for our software products. As an Agnitum customer you have free online access to all official Outpost Security Suite PRO documentation.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/agnitum-outpost-security-suite-pro-751.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/3977993701153900520/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/agnitum-outpost-security-suite-pro-751.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3977993701153900520'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3977993701153900520'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/agnitum-outpost-security-suite-pro-751.html' title='Agnitum Outpost Security Suite Pro 7.5.1 - 1 Year [Giveaway]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-1818492181134466294</id><published>2011-12-20T22:17:00.000+01:00</published><updated>2011-12-20T22:17:48.353+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Memory Corruption"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability"/><category scheme="http://www.blogger.com/atom/ns#" term="win32k.sys"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 7"/><title type='text'>New Windows 7 Vulnerability</title><content type='html'>   Researchers are warning about a new remotely exploitable vulnerability in 64-bit Windows 7 that can be used by an attacker to run arbitrary code on a vulnerable machine. The bug was first reported a couple of days ago by an independent researcher and confirmed by &lt;b&gt;Secunia&lt;/b&gt;.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/new-windows-7-vulnerability.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/1818492181134466294/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/new-windows-7-vulnerability.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1818492181134466294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1818492181134466294'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/new-windows-7-vulnerability.html' title='New Windows 7 Vulnerability'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-827216185709134243</id><published>2011-12-20T19:41:00.000+01:00</published><updated>2011-12-20T19:41:00.413+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antivirus software"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Antivirus software sales expected to show strong growth in 2012</title><content type='html'>   As hackers continue to strike businesses, the security industry is expected to have a big year.&lt;br&gt;The prevalence with which hackers are handing out headaches to IT security pros will have a big upside for vendors in the coming year, according to new figures from Canalys.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/antivirus-software-sales-expected-to.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/827216185709134243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/antivirus-software-sales-expected-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/827216185709134243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/827216185709134243'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/antivirus-software-sales-expected-to.html' title='Antivirus software sales expected to show strong growth in 2012'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-3280551771325301514</id><published>2011-12-20T16:12:00.000+01:00</published><updated>2011-12-20T16:12:53.433+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="logon"/><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Building Windows 8: Signing in with a picture password</title><content type='html'>   One of the new features coming in Windows 8 is the ability to sign in using a Picture Password. Passwords can be complex and hard to remember. With picture passwords, it&amp;#39;s easy to use and simple to remember how to sign in to your computer. Microsoft have posted a detailed article on how this works and it’s worth reading.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/building-windows-8-signing-in-with.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/3280551771325301514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/building-windows-8-signing-in-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3280551771325301514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/3280551771325301514'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/building-windows-8-signing-in-with.html' title='Building Windows 8: Signing in with a picture password'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-780322647605703450</id><published>2011-12-19T08:29:00.001+01:00</published><updated>2011-12-19T08:36:26.488+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PayPal"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing Scam"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Attention To new PayPal Phishing Scam</title><content type='html'>   The message is not from Blizzard Entertainment and the claims in the email are untrue. The message is a phishing scam designed to trick gamers into divulging their &lt;b&gt;World of Warcraft&lt;/b&gt; login details.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/attention-to-new-paypal-phishing-scam.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/780322647605703450/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/attention-to-new-paypal-phishing-scam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/780322647605703450'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/780322647605703450'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/attention-to-new-paypal-phishing-scam.html' title='Attention To new PayPal Phishing Scam'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-1518937823954740361</id><published>2011-12-16T23:11:00.000+01:00</published><updated>2011-12-16T23:11:34.431+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Explorer"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>IE to Start Automatic Upgrades across Windows XP, Windows Vista, and Windows 7</title><content type='html'>   Everyone benefits from an up-to-date browser.&lt;br&gt;   Microsoft recently announced that it will soon start updating Internet Explorer automatically. Starting in Australia and Brazil in January, Windows Update will ensure that the most up-to-date version of the browser is installed without any action on the user&amp;#39;s part; other countries will be rolled out in stages. Until now, users have always been asked whether they want to upgrade to a major new version.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/ie-to-start-automatic-upgrades-across.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/1518937823954740361/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/ie-to-start-automatic-upgrades-across.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1518937823954740361'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1518937823954740361'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/ie-to-start-automatic-upgrades-across.html' title='IE to Start Automatic Upgrades across Windows XP, Windows Vista, and Windows 7'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-2987565791575099605</id><published>2011-12-16T21:21:00.000+01:00</published><updated>2011-12-16T21:21:37.429+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Flash Player"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="scam"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Malware cons users into paying for free product</title><content type='html'>   The scam has appeared on a Russian social network and charges $3 for a bogus activation code.&lt;br&gt;A creative scheme that charges people via SMS for what should be a free copy of Adobe Systems&amp;#39; Flash player is apparently undergoing a test run on a Russian social network, according to security vendor Bitdefender.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/malware-cons-users-into-paying-for-free.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/2987565791575099605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/malware-cons-users-into-paying-for-free.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2987565791575099605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/2987565791575099605'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/malware-cons-users-into-paying-for-free.html' title='Malware cons users into paying for free product'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-4317924330308932014</id><published>2011-12-16T17:16:00.000+01:00</published><updated>2011-12-16T17:16:02.037+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyberwar"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="social networks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Security Trends For 2012</title><content type='html'>2011 is coming to an end, so now it’s time to try to see what we have to expect for the next 12 months:&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/security-trends-for-2012.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/4317924330308932014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/security-trends-for-2012.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4317924330308932014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4317924330308932014'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/security-trends-for-2012.html' title='Security Trends For 2012'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-8173381341941146920</id><published>2011-12-16T16:24:00.000+01:00</published><updated>2011-12-16T16:24:27.092+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="open-redirect"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><title type='text'>Open Google Redirect beeing used by Spammers</title><content type='html'>   Researchers at Solera Labs have discovered spammers using an open redirect at Google to hide the final destination of their link from both users and filters.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/open-google-redirect-beeing-used-by.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/8173381341941146920/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/open-google-redirect-beeing-used-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8173381341941146920'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8173381341941146920'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/open-google-redirect-beeing-used-by.html' title='Open Google Redirect beeing used by Spammers'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-8488743575830541012</id><published>2011-12-15T11:37:00.000+01:00</published><updated>2011-12-15T11:37:19.561+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware scanner"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft SafetyScanner"/><category scheme="http://www.blogger.com/atom/ns#" term="security tool"/><title type='text'>Microsoft Safety Scanner (on-demand computer scanner)</title><content type='html'>Microsoft SafetyScanner is a downloadable free portable on-demand security scanner to help techies deal with malware outbreaks.&lt;br&gt;The tool is a 70+MB, self-contained security scanner package that you download and run.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/microsoft-safety-scanner-on-demand.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/8488743575830541012/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/microsoft-safety-scanner-on-demand.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8488743575830541012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/8488743575830541012'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/microsoft-safety-scanner-on-demand.html' title='Microsoft Safety Scanner (on-demand computer scanner)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-4778910025846474005</id><published>2011-12-15T08:54:00.001+01:00</published><updated>2011-12-15T08:58:42.068+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AV-Comparatives"/><category scheme="http://www.blogger.com/atom/ns#" term="AV-Test Reports"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware removal test"/><title type='text'>Av-Comparatives Removal-Test (December 2011)</title><content type='html'> AV-Comparatives (Anti-Virus Comparative) has released their Malware Removal Test December 2011. This test focused only on the malware removal/cleaning capabilities of the products, nothing to do with detection rates or protection capabilities. According to the organization, the report is aimed towards home users. Ten samples were used in the test with scoring done based on removal of the malware and how convenient it was to do the removal. Scales of A-D were used for this. In colloquial terms, how well is the malware (files, etc) cleaned up? Eighteen products were tested. The antivirus products were used.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/av-comparatives-removal-test-december.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/4778910025846474005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/av-comparatives-removal-test-december.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4778910025846474005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/4778910025846474005'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/av-comparatives-removal-test-december.html' title='Av-Comparatives Removal-Test (December 2011)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-563830927818572402.post-1235593957902480632</id><published>2011-12-14T16:11:00.000+01:00</published><updated>2011-12-14T16:11:53.113+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Yahoo Mail"/><title type='text'>Yahoo! Introduces Stronger User Authentication – Second Sign-in Verification</title><content type='html'>   Online account compromise occurs regularly and will probably continue in the foreseeable future. Often hackers employ &lt;a href=&quot;http://level-security.blogspot.com/p/glossary.html&quot;&gt;botnets&lt;/a&gt; to hijack accounts from millions of unsuspecting consumers. In turn, these hijacked accounts are sold and used to initiate email scams, with messages seemingly sent from the legitimate account owners to their contacts. Scams can range from the less harmful “check this cool stuff” advertising spam to the more damaging “send money to help your friend” email. Worse still, the scam emails may contain malicious links that lead to the installation of malware on computers, which then makes the computers part of the ever-growing botnet networks.&lt;br&gt;&lt;a href=&quot;http://level-security.blogspot.com/2011/12/yahoo-introduces-stronger-user.html#more&quot;&gt;Read more »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://level-security.blogspot.com/feeds/1235593957902480632/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://level-security.blogspot.com/2011/12/yahoo-introduces-stronger-user.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1235593957902480632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/563830927818572402/posts/default/1235593957902480632'/><link rel='alternate' type='text/html' href='http://level-security.blogspot.com/2011/12/yahoo-introduces-stronger-user.html' title='Yahoo! Introduces Stronger User Authentication – Second Sign-in Verification'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>