Lost + found: Bears, mis-perceptions and panic
You cannot outrun Bears! Microsoft's views on the cost-benefit calculation of attackers: You cannot outrun the Bears, so let's make a deal
A security expert says that holes in the Linux kernel, perceived by distributors as merely potential DoS vulnerabilities, can be exploited for penetration attacks: When a "potential DoS" means a one-shot remote kernel exploit: the SCTP story
I know what pages you've browsed. A demonstration browser test shows how easy it is for outsiders to examine your browsing habits by looking at your browser History: Start Panic
High ranking figures in politics, business and industry have fallen prey to targeted attacks via apparently innocuous PDF's and Office documents. F-Secure has examples of some of these innocent looking documents: Targeted Examples
(trk)