Sony’s OTHER DRM software uninstaller will be pulled



According to zdnet.com, Sony and SunnComm are pulling the OTHER DRM uninstaller from the web and it will be replaced with a safer version of the uninstaller. Researchers blogging at freedom-to-tinker.com had detailed serious vulnerabilities in the uninstaller for the DRM software made by SunnComm (called MediaMax). The companies say an effort will be made to contact the 223 users who had downloaded the uninstaller for the MediaMax software.


This is very good, the buyback/swap info today and now 1 of the uninstallers has been pulled from the web, attempts are being made to contact the downloaders. As of yet, I don’t know that the XCP uninstaller is available again. I suspect since the XCP uninstaller was the one recommended to remove the controversial XCP rootkit, there are a few more than 223 users who had downloaded THAT one.

Also, Freedom-to-tinker is working with Sony to review the NEW uninstaller for MediaMax before it’s made publicly available. (Maybe the XCP uninstaller too?)

Related Posts

Blog Traffic Exchange Related Posts
  • Diebold Voting machine vulnerabilities Freedom to tinker brings us this BIG problem. I guess what concerns me most about this, is the way I see it, voter fraud has pretty much gone on since there have been elections. Let's face it, there is always someone, acting officially or not that will jockey for the......
  • How to Remove Cyber Security | Cyber Security Removal Guide Cyber Security is a rogue antivirus application. It is in the same family as totalsecurity (total security Removal Guide) and SystemSecurity. This software installs through web popups and trojan horse activity makes false claims about your system being compromised by viruses and other security problems, hijacks we browser activity claiming......
  • How to Remove ActiveSecurity | Active Security Removal Guide ActiveSecurity is a rogue antivirus application that uses graphics to indicate a similarity with Microsoft Security Center. It installs via malware including trojans and brings several files along with it when it installs that it then claims are viral and that in order to clean up the mess the user......
Blog Traffic Exchange Related Websites
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
  • Google's Gmail Hacked by China Again Google discovered Chinese hackers tried to steal the passwords of senior U.S. government officials as well as South Korean officials, Chinese activists and journalists this past Wednesday.  There are also reports thousand of other email accounts were also targeted. Google stated on their blog, “The hackers tried to use a......
  • (IN)SECURE Magazine Issue 26 released (IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Issue 26 has just been released. Download it from: http://www.insecuremag.com The covered topics include: - PCI: Security's lowest common denominator - Analyzing Flash-based RIA components and discovering vulnerabilities - Logs: Can we finally......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site