Vmyths

Truth about computer security hysteria

  • Home
  • About
  • FAQs
  • False Authority Syndrome
  • The China Syndrome
Aug 18 2008

FAQs

No Gravatar

Frequently Asked Questions (FAQs)…

  • FAQ: Where are the lists you used to keep on computer security hoaxes, myths, and urban legends? We no longer maintain those lists (read why) but we do keep them here for archival & citation purposes.
  • FAQ: Where are the older columns & podcasts? We’re slowly moving them to the new format. Click here for our ancient columns.
Share
  • FAQ: How often does virus hysteria occur?
  • FAQ: How can I reduce the spread of hoax virus alerts in my company?
  • FAQ: How can I spot a hoax computer virus/worm alert?
  • FAQ: I received a virus alert from an authoritative source. Should I forward it to my friends?
  • FAQ: My friend forwarded a hoax email to everyone. What can I do to help my duped friend?
  • FAQ: Why are we so addicted to antivirus updates?
  • FAQ: Why do reporters focus on pointless trivia when they write about viruses & worms?
  • FAQ: Why do we constantly update antivirus products, yet only occasionally update anti-hacking products?
  • FAQ: Will ‘cyber-terrorism’ occur in the near future?

Admin | 18 August 2008 |

RSS  Entries RSS | Comments RSS

  • That’s right: NO ads

    This site focuses on hysteria, not ads. But if you'd like to help out, please visit the founder's web­master wish­list at Amazon.com.
  • Categories

    • By sector
      • Customers
      • Gov't & military
      • Reporters & bloggers
        • Wikipedia
      • Security vendors
        • Press releases
      • Think tanks
    • By type of hysteria
      • "Solar calculator" math
      • Chain-letter emails & tweets
      • Charlatans & false prophets
      • Cyber-war & cyber-terror
      • Media circus
      • SCADA
    • Victims of hysteria
    • Website issues
      • Includes multimedia
  • Vmyths on Twitter

    • No public Twitter messages.
  • Allies in the fight

    • “Dick Destiny”
    • SecurityCritics.org
    • Snopes.com
    • Wikipedia ”virus hoax” article
  • Blogroll

    • 10 easy steps to writing the scariest cyberwarfare article ever
    • Better metrics needed for security, says expert
    • Debunked: “cybercrime exceeds drug trade” myth
    • Irresponsible reporting on ”attacks” from cyberspace
    • Is an overwhelming bunch of cyber tourists an act of war?
    • Oops! Iranian media falls for Obama BlackBerry hack hoax
    • Report: UK hospital IT staffs HELPED worm to infect operating room PCs
    • The Myth of Cyber Terrorism (PDF)
    • Trend Micro CEO claims AV industry lied for 20 years
  • Newsletters & tweets

    • Newsletter signup
    • RSS feed
    • Twitter: Vmyths
  • Older content

    • Columns & podcasts
    • Hoaxes, myths, ULs

This site is NOT sponsored by computer security firms. Compilation © 2008 Vmyths. All original works by Rob Rosenberger are licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License. Other authors' works are published here with permission.

WordPress Themes