According to Information Week, there’s a new IM worm out hitting the MSN, ICQ, Yahoo and AIM networks. It poses as a come on for a Santa Claus site. On visiting the site, users receive an unexpected “present” a rootkit which is hidden.
Category: Security
-
Top 10 spyware tricks of 2005
You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.
-
Sunbelt Finishes Kerio Firewall acquisition
Sunbelt Software has announced the completion of their acquisition of the Kerio Personal Firewall. They’ve also acquired the Kerio Server Firewall. The products have temporarily been rebranded…
We have acquired both the Kerio Personal Firewall and the Kerio Server Firewall. Both products will be re-branded on an interim basis as the “Sunbelt Kerio Personal Firewall†and “Sunbelt Kerio ServerFirewallâ€.
-
Serious Symantec Antivirus Vulnerability
A few things to catch up on this afternoon, but first up is a Serious vulnerability in Symantec Antivirus. (It’s always serious when security software has a vulnerability.) The securityfix is reporting that a vulnerability has been discovered in the way Symantec deals with rar archived files. A specially made rar archive could make a hidden virus or worm in the archive run. It could be exploited remotely, in other words, as Symantec scans the file/attachments in email, the specially crafted rar file could make Symantec run the enclosed bug.
-
The CIA/FBI virus revisited
I’m sure you remember the CIA/FBI virus a few weeks back. There was a German version of this and apparently one individual took the warning email to heart and turned himself in for child pornography. Found this at Sunbeltblog and f-secure.
-
How embarrasing… Computer security firms database hacked
The Washington Times, has a story from Brian Krebs of their Security Fix blog about …
Guidance Software — the leading provider of software used to diagnose hacker break-ins — has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials and network-security professionals.
-
Network Security guide for the home or small business network – Part 8 – Don’t be afraid to ask for help
Deep breath time. We’ve covered a lot of good topics and it’s important at this point to take a close look at what we’ve talked about and think. “Am I overwhelmed?” If so that’s fine. Maybe you don’t have enough time to think about all of this network security stuff. Maybe, no matter how hard you try it doesn’t make sense.
-
Disinfecting a PC… part 7
Ok, another reboot after the BHO cleaning. Things are a good deal more responsive now, less disc swapping going on. (I suspect that those three missing BHO entries may have been causing the slow down, but I don’t know.) Installing wintop so that processes can be monitored. Also, getting spybot S&D *(search and destroy) installed and copying update from disc. The system is pretty much won at this point, I don’t see anything running that I haven’t LET run at boot, everything that I had as suspect has been disabled, now it’s just a matter of cleaning up the remnants and leftovers.
-
Another example of how we’re vulnerable for identity theft
The SecurityFix is reporting on a security breech at reevesnamepins.com a company that supplies (among others) law enforcement personnel. Apparently, CardCops (which monitors for possible stolen data), discovered names and addresses of several law enforcement officers from across the country. The common denominator seemed to be recent orders at reevesnamepins.com and the company has confirmed a recent security breech.
-
More wolves in sheeps clothing – rogue or suspect antispyware
(or for that matter, rogue or suspect antivirus.) What’s fascinating about this category is most of these products either use security vulnerabilities to get into a system, or merely convince a person browsing the web that they’re the right tool for the job. Kind of like virtual con-men in a sense…. Anyway… Spyware Confidential has a listing of the top 10 rogue/suspect antispyware programs. Some familiar names are mentioned…