Trojans besiege online gamers

,----[ Quote ]
| Virus writers at first used classic key loggers to steal passwords for online
| games, a tactic that can be traced back to 1997.

Malware makers target security sites

,----[ Quote ]
| The big idea is that if they can take the sites down for a couple of weeks,
| chances are their malware will be safely installed because no one will have a
| clue how to remove it.

Security maven: QuickTime flaw threatens PCs, Macs

,----[ Quote ]
| The researcher, Petko D. Petkov, on Wednesday posted proof-of-concept code
| that shows how the exploit can be used to run privileged code on an unwitting
| user's machine.


How secure are Linux, Window and Mac OS?

,----[ Quote ]
| Overall it looks like the Linux kernel turns out to be the most
| secure system. Not only does it have virtually no security holes
| that lead to system access, it's also very resilient to remote
| attacks, two areas where both Windows and Mac OS X aren't doing
| very well.

Linux more secure than Windows, national survey shows

,----[ Quote ]
| In its first annual Security Issues Survey for the debut of the Software
| Security Summit conference in La Jolla, California, BZ Research polled
| 6,344 software development managers about the security of different popular
| enterprise operating environments and Linux and open source consistently
| topped Microsoft Windows, according to respondents.

Why Windows is less secure than Linux

,----[ Quote ]
| Windows is inherently harder to secure than Linux. There I said
| it. The simple truth.
| Many millions of words have been written and said on this topic.
| I have a couple of pictures.