Several firms have recently sprung up that provide tools to copy e-mail and social-network contact lists from Outlook, Gmail, Hotmail, AOL, MySpace, Friendster, and other sites.
Web site operators who lure unsuspecting users into sharing their address lists can then send invitations to all the contacts in order to swipe even more private info.
Windows 7′s arrival is just a few months away, but many people aren’t waiting and just want to replace Vista’s newness — some say weirdness — for the familiarity of XP.
If you long for the good old days of XP and still have your install CD, this step-by-step guide will help you revert to Vista’s predecessor.
Nearly 18 months after it was discovered, Microsoft has finally fixed a hole in the AutoRun function of older Windows versions that allowed viruses to spread via external storage devices.
While it’s good to know Microsoft is finally listening to the complaints of the Windows community, the company’s delay in applying important patches put our systems at risk unnecessarily.
Norton Internet Security Suite 2009, the top-rated security suite this year — as it was last year — now uses fewer system resources than before without skimping on protection.
If you’re not a fan of Norton products, there are plenty of other contenders worthy of consideration that can challenge the long-time security-software leader.
SiteAdvisor.com, which rates Web sites on a green-yellow-red scale, is releasing details for the first time on how quickly it retests sites, after a story on the subject appeared in Windows Secrets on
To its credit, the site-rating service — which was acquired in 2006 by the security firm McAfee Inc. — is publishing a phone number for complaints and says it will reverse within days any genuine rating errors that are brought to its attention.
The free SiteAdvisor browser add-in claims to protect you by labeling Web sites green, yellow, or red to indicate that they are safe, questionable, or dangerous.
But a good or bad SiteAdvisor rating can persist for as long as a year after the site’s content has changed, raising serious questions about the service’s usefulness.
In my Feb. 5
I took Microsoft to task for allowing any Trojan horse to silently disable the protection provided by User Account Control (UAC) in the soon-to-be-released Windows 7.
Microsoft execs initially implied that this problem wouldn’t be fixed, but the company abruptly changed its tune and now states that UAC will be protected from sneaky changes. Bravo!
Many people who watched live streaming video of the inauguration of U.S. President Barack Obama on Jan. 20 may not realize that their PC was used to send the video to other PCs, too.
Clicking “yes” to a CNN.com dialog box installed a peer-to-peer (P2P) application that uses your Internet bandwidth rather than CNN’s to send live video to other viewers.
It’s been a hellacious week for security admins all over the world: the polymorphic worm known as Downadup, Conficker, and Kido has infected millions of computers.
Fortunately, you can scan, scour, and secure your systems by following four relatively simple steps.
Worldwide spam traffic dramatically dropped after a major spam server was temporarily shut down last fall, raising public awareness of botnets: networks of PCs that have been turned into spam-spewing robots.
Most antivirus applications are ill-equipped to stop this kind of malware, but you can reduce the risk of having your PC become zombified.