Keyword: exploit

Brevity: Headers | « Text »
  • Vulnerability Exploitable via Printer Protocols Affects All Windows Versions

    07/13/2016 9:34:12 PM PDT · by Utilizer · 4 replies
    Softpedia ^ | Jul 12, 2016 21:05 GMT | Catalin Cimpanu
    Microsoft has patched today a critical security vulnerability in the Print Spooler service that allows attackers to take over devices via a simple mechanism. The vulnerability affects all Windows versions ever released. Security firm Vectra discovered the vulnerability (CVE-2016-3238), which Microsoft fixed in MS16-087. At its core, the issue resides in how Windows handles printer driver installations and how end users connect to printers. Exploit executes payload under SYSTEM user By default, in corporate networks, network admins allow printers to deliver the necessary drivers to workstations connected to the network. These drivers are silently installed without any user interaction and...
  • HummingBad: Chinese malware infects 10 million Android devices, experts warn

    07/05/2016 8:03:35 PM PDT · by Utilizer · 6 replies
    News (.com .au) ^ | July 6, 201611:31am (AUS) | Matthew Dunn
    Cybersecurity specialist Check Point has been tracking the malware called HummingBad since its discovery in February and claim there has been a spike in infected devices. In a new report, Check Point said the malware was a multistage attack chain with two main components, which first infected Androids when people visited certain websites. “The first component attempts to gain root access on a device with a rootkit [software] that exploits multiple vulnerabilities. If successful, attackers gain full access to a device,” the report read. “If rooting fails, a second component uses a fake system update notification, tricking users into granting...
  • Windows 10 zero day selling for $90,000 (how exploits are marketed on crime forums)

    06/01/2016 6:17:10 AM PDT · by dayglored · 9 replies
    The Register ^ | Jun 1, 2016 | Darren Pauli
    A Windows zero day vulnerability granting hackers deeper access to compromised machines is being sold for US$90,000. The local privilege escalation vulnerability is being sold on crime forum and promises to help attackers who already have access to hacked machines. Seller BuggiCorp claims in a sales thread and proof-of-concept videos that the local privilege escalation works on Windows systems from version 2000 to the considerably more secure 10. It works in the presence of Microsoft's lauded enhanced mitigation toolkit which introduces many security features baked into Windows 10 to older platforms. Researchers from Trustwave's Spiderlabs team, who found the...
  • Hot Potato exploit mashes old vulns into Windows System 'sploit

    01/24/2016 7:36:54 PM PST · by Utilizer · 10 replies
    The Register ^ | 20 Jan 2016 at 08:39 | Darren Pauli
    Shmoocon Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities to gain local system-level access on Windows versions up to 8.1. The unholy zero-day concoction, reported to Microsoft in September and still unpatched, is a reliable way of p0wning Windows for attackers that have managed to pop user machines. Breen released exploit code for his attack dubbed Hot Potato following his talk at the Shmoocon conference in Washington over the weekend. "Hot Potato takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay -\- specifically HTTP-SMB relay - and...
  • Netgear router exploit detected

    10/09/2015 10:56:42 PM PDT · by WhiskeyX · 17 replies
    BBC ^ | 9 October 2015 | Chris Baraniuk, Technology reporter
    A security researcher in the US has said his Netgear router was hacked after attackers exploited a flaw in the machine. Joe Giron told the BBC that he discovered altered admin settings on his personal router on 28 September. The compromised router was hacked to send web browsing data to a malicious internet address. Netgear says the vulnerability is "serious" but affects fewer than 5,000 devices. Mr Giron found that the Domain Name System (DNS) settings on his router had been changed to a suspicious IP address. "Normally I set mine to Google's [IP address] and it wasn't that, it...
  • Rivlin: Radicals Have Hijacked Ramadan

    07/05/2015 3:39:52 PM PDT · by Eleutheria5 · 8 replies
    Arutz Sheva ^ | 5/7/15 | Yaakov Levi
    At an event marking the end of the Ramadan fast on Sunday, President Reuven Rivlin spoke with Arabic language mediaand discussed a number of issues, chief among them the relations between Arabs and Jews in Israel. At the outset, Rivlin noted that both Jews and Muslims had fasted on Sunday – the latter for Ramadan, and the former for the Seventeenth Day of Tammuz, commemorating the events leading up to the destruction of the Holy Temples in Jerusalem. A common fast, said Rivlin, could help build a bridge to understanding to both communities. “I am aware of the distress and...
  • Microsoft won't fix Internet Explorer zero-day

    06/26/2015 7:36:19 PM PDT · by Utilizer · 47 replies
    iTnews (AUS) ^ | Jun 24, 2015 9:27 AM (AUS) | Allie Coyne, Juha Saarinen
    HP researchers have published details and proof-of-concept exploit code for a number of zero-day vulnerabilities in Microsoft's Internet Explorer web browser which allow attackers to bypass a key exploit mitigation. The researchers - part of HP's zero-day initiative team - have a policy to only disclose details of bugs reported to vendors after patches are issued. But the team decided to go public after being informed by Microsoft that it did not intend to fix the bugs as the company feels the vulnerabilities don't affect enough users. The flaws were serious enough, however, for Microsoft to earlier award the HP...
  • Remote exploit vulnerability in bash CVE-2014-6271

    09/25/2014 10:47:12 AM PDT · by zeugma · 26 replies
    CSOonline ^ | Sep 24, 2014 | Dave Lewis
    A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. You will need to patch ASAP. Bash supports exporting shell variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process.  The major attack vectors that have been identified in this case are HTTP requests and CGI scripts.  From Akamai:  Akamai has validated the existence of the vulnerability...
  • This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here:
  • Microsoft patches Internet Explorer bug for Windows XP

    05/02/2014 6:29:50 AM PDT · by JoeProBono · 8 replies
    telegraph ^ | 02 May 2014 | Sophie Curtis
    Microsoft has issued a patch for a security vulnerability in Internet Explorer to all versions of Windows, including Windows XP, despite claiming it would release no more patches for the outdated operating system after 8 April 2014. Earlier this week, both the UK and US governments advised citizens to consider using alternatives to Microsoft’s Internet Explorer browser, after the company discovered a vulnerability that could allow hackers to gain access to users' computers and steal their data. The vulnerability made headlines because it coincided with the end of support for Windows XP, meaning that anyone still running the 13-year-old operating...
  • MS Windows Local Privilege Escalation Zero-Day in The Wild

    11/30/2013 10:10:25 AM PST · by Utilizer · 35 replies
    fireeye ^ | November 27, 2013 | Xiaobo Chen and Dan Caselden
    FireEye Labs has identified a new Windows local privilege escalation vulnerability in the wild. The vulnerability cannot be used for remote code execution but could allow a standard user account to execute code in the kernel. Currently, the exploit appears to only work in Windows XP. This local privilege escalation vulnerability is used in-the-wild in conjunction with an Adobe Reader exploit that appears to target a patched vulnerability. The exploit targets Adobe Reader 9.5.4, 10.1.6, 11.0.02 and prior on Windows XP SP3. Those running the latest versions of Adobe Reader should not be affected by this exploit. Post exploitation, the...
  • Democrats Love to Exploit Sandy Hook Atrocities (Video)

    04/02/2013 8:21:17 PM PDT · by publius321 · 5 replies
    Innocent lives mean Nothing to Obama, Pelosi, Reed, Schumer, Franken & Wasserman Schultz. They are lovers of death and have the blood of 50 million innocent babies on their hands. Their blood lust is insatiable and they rejoice inside when these murders occur. They may not directly cause them but they probably would as often as possible if they were certain they would get away with it... (Video)
  • Child Abuse & The Obama Campaign

    10/30/2012 8:51:07 PM PDT · by publius321
    Some troubling observations & "Jonesian" similarities. (video)
  • Zagat trying to exploit 9/11 for profit

    09/10/2011 8:50:12 AM PDT · by NowApproachingMidnight · 5 replies
    Email | 9/10/11 | Self
    9/11: Stories of Courage, Heroism and Generosity We are pleased to announce 9/11: Stories of Courage, Heroism and Generosity with an introduction from Tim Zagat, Co-founder and CEO of Zagat Survey, along with contributions from former New York City Mayor Rudy Giuliani and former New York Governor George Pataki. Upon reflection of the 9/11 attacks, the random acts of kindness displayed by selfless individuals are too often overlooked. As the 10-year anniversary of this fateful day approaches, Zagat honors these heroes for their contributions to rebuilding and uniting a country in the wake of destruction. Order Now: Regular Price: $24.95...
  • Warning: E-mail virus spreading (DHS investigating?)

    09/09/2010 1:57:15 PM PDT · by Rutles4Ever · 35 replies
    Twitter ^ | 09/09/2010 | Jason Ryan
    "Here You Have" Virus Email spreading. DHS US-CERT Computer Emergency Readiness Team looking into issue. will issue bulletin.
  • "Millions" Of Home Routers Vulnerable To Web Hack

    07/16/2010 9:38:35 AM PDT · by ShadowAce · 18 replies · 3+ views
    Forbes ^ | 13 July 2010 | Andy Greenberg
    The upcoming Black Hat security conference in Las Vegas offers an annual parade of security researchers revealing new ways to break various elements of the Internet. But few of the talks have titles quite as alarming as one on this year's schedule: "How to Hack Millions of Routers."Craig Heffner, a researcher with Maryland-based security consultancy Seismic, plans to release a software tool at the conference later this month that he says could be used on about half the existing models of home routers, including most Linksys, Dell, and Verizon Fios or DSL versions. Users who connect to the Internet through...
  • IBM unleashes virus on AusCERT delegates

    05/21/2010 8:14:34 PM PDT · by smokingfrog · 11 replies · 527+ views ^ | May 21, 2010 | Nate Cochrane
    Malware-infected USB key the culprit. Delegates to AusCERT, Australia's premier information security event held this week on the Gold Coast, have taken home a little of the stuff they spent the week agonising over - a virus. In an email this afternoon, IBM advised visitors to its AusCERT booth that its complimentary USB key was infected with a virus. An IBM spokesman and conference organisers confirmed the email was genuine. It is the second time in two years that clumsy exhibitors have infected their customers with viruses. "At the AusCERT conference this week, you may have collected a complimentary USB...
  • Arianna Huffington Exploits Coal Mining Tragedy, Cries for Bigger Government

    04/14/2010 7:17:56 AM PDT · by 198ml · 23 replies · 491+ views
    Newsbusters ^ | 04/14/10 | Anthony Kang
    The co-founder of progressive blog The Huffington Post, Arianna Huffington, has attributed the West Virginia mining disaster, along with virtually every other accident under the sun, as a direct result of small-government and corporate greed in the April 13 Huffpo column "The West Virginia Mining Disaster and the Financial Crisis Have the Same Root Cause." "Officials say it's too soon to pinpoint the exact cause of the tragic explosion at the Upper Big Branch mine in West Virginia that took the lives of 29 miners, but we certainly know enough to identify the root cause," Huffington began. "It's the same...
  • Racebaiting D.S.A. Marxists Exploit “Immigration Reform” to Further Socialist Agenda

    04/13/2010 12:50:59 PM PDT · by Nachum · 5 replies · 145+ views
    keywiki blog ^ | 4/13/10 | Trevor Loudon
    Democratic Socialists of America (DSA) is an highly influential organization. While only 6,000 strong, DSA has considerable strength in the labor movement, non profits, education and inside the Democratic Party. While Marxist based, DSA’s innocuous sounding name, allows the organization to operate in ways and places that their allies in the the Communist Party USA cannot. After using its clout to push through “healthcare reform” DSA is now using its influence in the giant union SEIU, to promote “immigration reform”.
  • Charlie Miller to reveal 20 zero day security holes in Mac OS X

    03/25/2010 1:15:01 PM PDT · by for-q-clinton · 28 replies · 522+ views
    Engadget ^ | 19 Mar 2010 | Darren Murph
    Say, Charles -- it's been awhile! But we're pleased as punch to see that you're back to your old ways, poking around within OS X's mainframe just looking for ways to remotely control the system, snag credit card data and download a few interoffice love letters that are carefully stashed 15 folders down within 'Documents.' The famed Apple security expert is planning yet another slam on OS X at CanSecWest, where he'll reveal no fewer than 20 zero day security holes within OS X. According to Miller, "OS X has a large attack surface consisting of open source components, closed...
  • 'Jews exploit Holocaust as propaganda'

    01/25/2010 3:04:18 PM PST · by Nachum · 33 replies · 781+ views
    Jerusalem Post ^ | 1/25/10 | staff
    The Holocaust only gets media coverage because of affluent Jews' financial backing, military might and lobbying fronts, presenting a skewed version of events to the world, a high-ranking Polish bishop told a Catholic news portal on Monday. Tadeusz Pieronek, a Polish bishop and professor and a friend of the last pope, John Paul II, claimed that "the Holocaust as such is a Jewish invention" promoted in the press by Jews to gain support for Israel. Pieronek told the Web site Pontifex.roma that while the Holocaust was not exclusively Jewish, Jews had monopolized it in lieu of encouraging "serious historical debate,...
  • New attack proves critical Windows bug 'highly exploitable'

    01/30/2008 10:20:42 AM PST · by ShadowAce · 7 replies · 112+ views
    ComputerWorld ^ | 30 January 2008 | Gregg Keizer
    Security researchers yesterday said they'd discredited Microsoft's claim that the year's first critical Windows vulnerability would be "difficult and unlikely" to be exploited by attackers. On Tuesday, Immunity Inc. updated a working exploit for the TCP/IP flaw spelled out Jan. 8 in Microsoft's MS08-001 security bulletin, and posted a Flash demonstration of the attack on its Web site. The exploit, which was released to customers of its CANVAS penetration testing software -- but is not available to the public -- was a revised version of code first issued two weeks ago. "This demonstrates conclusively that the MS08-001 IGMPv3 vulnerability is...
  • Coming to a Truck Stop Near You (Porn-Fueled Sex Slavery and Child Prostitutes in the USA)

    01/15/2008 6:55:08 AM PST · by Mrs. Don-o · 117 replies · 11,307+ views
    National Review ^ | January 15, 2008 | Ann Morse
    Fourteen-year-old Cara and her 15-year-old cousin, Stacy (not their real names) walked out of their homes in Toledo, Ohio on a rainy May day in 2005 to get milkshakes. A few blocks away, a couple driving a Lincoln Continental pulled alongside the cousins and asked if they wanted a lift. Believing the man’s claim to be a schoolmate’s father, the girls stepped into the car — and entered a nightmare world of sexual slavery. The couple drove the girls to a house and locked them in. As their families frantically searched for them, the teens were sold over and over...
  • Report: PDF files used to attack computers

    10/27/2007 5:40:16 PM PDT · by holymoly · 24 replies · 124+ views
    ZDNet ^ | Oct 27, 2007 | n/a
    E-mails containing malicious PDF files have been putting computers at risk since Friday, Finnish security software firm F-Secure said on Saturday. "The e-mails sent in bulk looked like credit card statements, and contained an attachment called 'report.pdf'," its Chief Research Officer Mikko Hypponen said in a statement. When such PDF files are viewed on vulnerable machines, they start downloading software from servers in Malaysia or Sweden, which are now being cleaned, he said. "There will be more such attacks." "We are worried about this case, as PDF attachments are typically not filtered at e-mail gateways." A security update for Adobe...
  • Another good reason to stop using telnet (Major hack against Solaris)

    02/12/2007 10:35:07 PM PST · by zeugma · 22 replies · 549+ views
    SANS ^ | 2007-02-12 | donald smith
    There is a major zero day bug announced in solaris 10 and 11 with the telnet and login combination. It has been verified. In my opinion NOBODY be should running telnet open to the internet. Versions of Solaris 9 and lower do not appear to have this vulnerability. The issue: The telnet daemon passes switches directly to the login process which looks for a switch that allows root to login to any account without a password. If your telnet daemon is running as root it allows unauthenticated remote logins. Telnet should be disabled. Since 1994 the team has recommended...
  • IE Bug Can Be Exploited Via E-mail

    09/21/2006 5:31:55 PM PDT · by Eagle9 · 52 replies · 1,341+ views
    TechWeb ^ | September 21, 2006 | Gregg Keizer
    Exploits against the unpatched vulnerability in Microsoft's Internet Explorer are increasing and attackers are gathering momentum, researchers said Thursday. They warned that the problem would become worse if cyber criminals attack via e-mail next. "It might come to nothing, but it feels like a storm's coming," said Roger Thompson, the chief technology officer at Exploit Prevention Labs. "The potential is there. Call it a storm watch, not a storm warning." At least two different exploits have appeared this week, said Thompson, one linked to the Russian-made hacker exploit kit called WebAttacker, the other posted early Thursday on the xSec gray-hat...
  • How To Defend Against IE's VML Bug

    09/20/2006 12:41:51 PM PDT · by Eagle9 · 61 replies · 1,796+ views
    TechWeb ^ | September 20, 2006 | Gregg Keizer
    Although Microsoft has acknowledged that in-the-wild exploits are taking advantage of an unpatched flaw in Internet Explorer, the developer has not committed to cranking out a fix before next month's regularly-scheduled update on Oct. 10. Users who want to protect themselves now, however, do have options. Disable the vulnerable .dll: In the security advisory posted yesterday, Microsoft suggested that users can disable the vulnerable "Vgx.dll" from the command line. -- Click Start, choose Run, and then type -- regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX\vgx.dll -- Click OK, then click OK again in the confirmation dialog that appears. To undo the command,...
  • New Exploit Rocks IE, Downloads Scores Of Spyware, Adware

    09/19/2006 5:36:00 PM PDT · by Eagle9 · 94 replies · 2,911+ views
    TechWeb ^ | September 19, 2006 | Gregg Keizer
    An unpatched vulnerability in all editions of Microsoft's Internet Explorer browser is being exploited, security researchers said Tuesday, with the attack dumping a broad range of adware, spyware, and Trojans onto PCs whose users simply surf to an infected or malicious site. First reported by Sunbelt Software -- although rival Internet Security Systems claimed it was the first to discover the bug -- the vulnerability is in how IE renders VML (Vector Mark-up Language), an extension of XML that defines on-the-Web images in vector graphics format. The previously unknown -- and thus unpatched -- bug inside IE is already being...
  • Second zero-day Excel flaw emerges

    06/20/2006 7:47:56 PM PDT · by Swordmaker · 16 replies · 519+ views
    CNET ^ | Published: June 20, 2006, 12:53 PM PDT | By Joris Evers
    Attack code for a new security hole in Excel has surfaced on the Internet, just as Microsoft is scrambling to respond to a separate bug in the spreadsheet program. The latest vulnerability could cause Excel to crash after a malicious file is opened, according to an alert Symantec sent to customers on Monday. The security company also said there was a risk that an intruder could commandeer a PC. "Attackers may also be able to execute arbitrary code…but this has not been confirmed," it said. The security hole exists because Excel fails to properly check user-supplied input before copying it...
  • 'Critical' IE bug threatens PC users

    03/27/2006 6:58:48 PM PST · by Ernest_at_the_Beach · 43 replies · 1,238+ views ^ | Monday 27th March 2006 09:14 GMT | Ciara O'Brien,
    A dangerous new exploit in Internet Explorer could put PCs and data at risk, Microsoft has admitted. The flaw, for which code has already been published on the internet, could be exploited to set an email-borne virus free on the unsuspecting public. Potential viruses could come as an attachment that conceals the code, or could possibly redirect users to a site that will unleash the code on the user's machine, leaving the computer open to remote attack. Once the PC is being controlled by a malicious user, it can then be used to launch attacks on other PCs. Even supposedly...
  • Microsoft: Vista won't get a backdoor

    03/04/2006 6:22:54 AM PST · by Panerai · 53 replies · 1,168+ views
    Cnet ^ | 03/03/2006 | By Joris Evers
    Windows Vista won't have a backdoor that could be used by police forces to get into encrypted files, Microsoft has stressed. In February, a BBC News story suggested that the British government was in discussions with Microsoft over backdoor access to the operating system. A backdoor is a method of bypassing normal authentication to gain access to a computer without to the PC user knowing. But Microsoft has now quelled the suggestion that law enforcement might get such access. "Microsoft has not and will not put 'backdoors' into Windows," a company representative said in a statement sent via e-mail. The...
  • The Windows MetaFile Backdoor?

    01/16/2006 9:48:37 AM PST · by ShadowAce · 106 replies · 2,183+ views
    Security Now! ^ | 13 January 2006 | Steve Gibson/Leo LaPorte
    This is a transcript from a show Steve Gibson did with Leo LaPorte. The link to the audio is at the above link. Also, I will excerpt a little of the relevant information here.Steve: And so, you know, because I'm a developer when I'm not being a hacker, I wanted to understand - oh, and the other thing is, I want to write a robust testing application, you know, that always works all the time. So I wanted to know, like, okay, what bytes have to be set which way, what matters, what doesn't. Because, you know, that's the way...
  • WMF (Windows meta file) exploit

    01/02/2006 5:07:56 AM PST · by KeyWest · 49 replies · 2,054+ views
    The SANS Institute ^ | January 2, 2005 | Various
    Looking forward to the week ahead, I find myself in the very peculiar position of having to say something that I don't believe has ever been said here in the Handler's diary before: "Please, trust us." I've written more than a few diaries, and I've often been silly or said funny things, but now, I'm being as straightforward and honest as I can possibly be: the Microsoft WMF vulnerability is bad. It is very, very bad.
  • Microsoft To Patch Windows on January 10th; Attack Spreads

    01/03/2006 11:42:23 AM PST · by HAL9000 · 52 replies · 3,487+ views
    Dow Jones News Service (excerpt) ^ | January 3, 2006 | Chris Reiter
    Excerpt - NEW YORK -(Dow Jones)- Microsoft Corp. (MSFT) plans to release a patch for a new security flaw at its next scheduled update release on Jan. 10, leaving users largely unprotected until then from a rapidly spreading computer virus strain. "Microsoft's delay is inexcusable," said Alan Paller, director of research at computer security group SANS Institute. "There's no excuse other than incompetence and negligence." "It's a problem that there's no known solution from Microsoft," said Alfred Huger, senior director of engineering at Symantec Corp.'s (SYMC) security response team. SANS Institute, via its Internet Storm Center, has taken the unusual...
  • Windows PCs face ‘huge’ virus threat

    01/02/2006 3:54:03 PM PST · by Swordmaker · 204 replies · 7,105+ views
    Financial Times via Drudge ^ | January 2 2006 18:18 | By Kevin Allison in San Francisco
    Computer security experts were grappling with the threat of a newweakness in Microsoft’s Windows operating system that could put hundreds of millions of PCs at risk of infection by spyware or viruses. The news marks the latest security setback for Microsoft, the world’s biggest software company, whose Windows operating system is a favourite target for hackers. “The potential [security threat] is huge,” said Mikko Hyppönen, chief research officer at F-Secure, an antivirus company. “It’s probably bigger than for any other vulnerability we’ve seen. Any version of Windows is vulnerable right now.” The flaw, which allows hackers to infect computers using...
  • New exploit released for the WMF vulnerability - YELLOW (NEW)

    12/31/2005 4:26:16 PM PST · by Salo · 28 replies · 1,114+ views
    SANS ^ | 12/31/05 | Tom Liston
    * New exploit released for the WMF vulnerability - YELLOW (NEW) Published: 2006-01-01, Last Updated: 2006-01-01 00:06:40 UTC by Tom Liston (Version: 6(click to highlight changes)) New exploit On New Year's eve the defenders got a 'nice' present from the full disclosure community. The source code claims to be made by the folks at metasploit and xfocus, together with an anonymous source. The exploit generates files: * with a random size; * no .wmf extension, (.jpg), but could be any other image extension actually; * a random piece of junk in front of the bad call; carefully crafted to be...
  • Potential new unpatched IE exploit ? ~ Yes...may affect other Browsers also...

    12/28/2005 2:55:03 PM PST · by Ernest_at_the_Beach · 69 replies · 3,196+ views
    Websense Security Labs ^ | Dec 28 2005 11:19AM | Websense Security Labs Blog Staff
    This alert is a follow-up to a post made yesterday on our blog: Websense® Security Labs™ has discovered numerous websites exploiting an unpatched Windows vulnerability in the handling of .WMF image files. The websites which have been uncovered at this point are using the exploit to distribute Spyware applications and other Potentially Unwanted Soware. The user's desktop background is replaced with a message warning of a spyware infection and a "spyware cleaning" application is launched. This application prompts the user to enter credit card information in order to remove the detected spyware. The background image used and the "spyware...
  • Exploit Released for Unpatched Windows Flaw

    12/28/2005 5:45:47 PM PST · by Salo · 25 replies · 1,376+ views
    Washington ComPost ^ | 12/28/05 | Brian Krebs
    Security researchers have released instructions for exploiting a previously unknown security hole in Windows XP and Windows 2003 Web Server with all of the latest patches applied.
  • Exploit code chases two Firefox flaws (May 9, 2005)

    12/12/2005 8:14:49 PM PST · by CometBaby · 44 replies · 1,077+ views
    ZDnet ^ | May 9, 2005 | Dawn Kawamotot
    If you use the Firefox browser .. read this !! .. Two vulnerabilities in the popular Firefox browser have been rated "extremely critical" because exploit code is now available to take advantage of them. The cross-site scripting and remote system access flaws were discovered in Firefox version 1.0.3, but other versions may also be affected, said security company Secunia, which issued the ratings Sunday.
  • Unpatched Firefox 1.5 exploit made public

    12/08/2005 4:06:06 PM PST · by zeugma · 157 replies · 2,627+ views
    Cnet ^ | 12/08/2005 | Dawn Kawamoto
    Exploit code for the latest version of open-source browser Firefox was published Wednesday, potentially putting users at risk of a denial-of-service attack. The exploit code takes advantage of a bug in the recently released Firefox 1.5, running on Windows XP with Service Pack 2. Firefox, which initially debuted over a year ago, has moved swiftly to capture 8 percent of the browser market. The latest Firefox flaw exists in the history.dat file, which stores information from Web sites users have visited with the Firefox 1.5 browser, according to a posting on the Internet Storm Center, which monitors online threats. "If...
  • Spy Axe 3.0

    12/06/2005 8:16:34 PM PST · by Carling · 87 replies · 5,144+ views
    My PC ^ | 12/6/05 | Me
    I hate vanity posts, but I am wondering if anyone in FR land knows anything about the Spy Axe 3.0 virus. It has set up shop in my toolbar and has hijacked my home page. eTrust isn't touching it. Help?!?!

    12/06/2005 6:38:12 PM PST · by CAWats · 61 replies · 8,523+ views
    12-06-2005 | Cawats
    My computer apparently picked up a virus from I have a pop-up window saying I have spyware and "it is recommended to use antispyware tools to prevent data loss." Everytime I close the popup it pops up again. I got tired of closing it and installed it then removed it with "Add/Remove Software" in the control panel. The pop-up is back. Can anyone help?
  • IE Exploit At Large, Microsoft Urges Scan

    11/30/2005 11:42:46 AM PST · by Eagle9 · 29 replies · 974+ views
    TechWeb News ^ | November 30, 2005 | Greg Keizer
    Microsoft acknowledged Tuesday that malicious software targeting an unpatched bug in Internet Explorer is on the loose, and urged users to run a complete system scan on its new Windows Live Safety Center -- which has a quirk of its own -- to detect and delete the code. In an update of a security advisory issued Nov. 21, Microsoft noted that both proof-of-concept code and an exploit are in circulation. The exploit can compromise PCs running IE on a host of the company's operating systems, including Windows 98, Windows Me, Windows 2000, and Windows XP. The bug, which was reported...
  • Sony Rootkits: A Sign Of Security Industry Failure (List of 52 CD Titles)

    11/18/2005 3:16:07 PM PST · by Eagle9 · 32 replies · 1,324+ views
    TechWeb News ^ | November 18, 2005 | Gregg Keizer
    Sony's controversial copy-protection scheme had been in use for seven months before its cloaking rootkit was discovered, leading one analyst to question the effectiveness of the security industry. "[For] at least for seven months, Sony BMG Music CD buyers have been installing rootkits on their PCs. Why then did no security software vendor detect a problem and alert customers?" asked Joe Wilcox, an analyst with JupiterResearch. "Where the failure is, that's the question mark. Is it an indictment of how consumers view security software, that they have a sense of false protection, even when they don't update their anti-virus and...
  • MS' Reaction to Sony's Rootkit Raises Some Questions

    11/17/2005 6:09:52 AM PST · by ShadowAce · 79 replies · 1,658+ views
    Groklaw ^ | 13 November 2005 | Pamela Jones
    When the news first broke in the mainstream press that Windows expert and blogger Mark Russinovich (he wrote a book about Windows for Microsoft) had found that Sony's anti-piracy efforts had gone too far and that Sony's DRM was installing an undetectable rootkit on customers' computers which they couldn't safely remove, the first reaction from Microsoft was guarded. They were concerned, they said, and were evaluating what, if anything, to do: Microsoft, which also ships an anti-spyware program, recently renamed "Windows Defender," hasn't yet decided whether it will also flag the Sony DRM software as malicious code, the spokesperson said....
  • Sony has infected over one-half million world wide nets incl U.S. Military

    11/15/2005 1:43:21 PM PST · by dickmc · 109 replies · 4,396+ views
    Welcome to Planet Sony ^ | 2005-11-15 09:28 | Dan Kaminsky
    More than one-half million networks infected by Sony including U.S. military and various countries. Dan Kaminsky, ,is the expert who broke this and did the work. His U.S. and Europe infection maps are shown below and are frightening. Dan did a hell of a good job. Search Google News for "sony numbers trouble" for more in an excellent article today that is very worth reading.
  • Outlook Express tech help needed (VANITY)

    12/05/2003 10:02:05 PM PST · by ILBBACH · 23 replies · 371+ views
    ILBBACH | 12/6/03 | ILBBACH
    I have been receiving an email since mid-afternoon. I guess its really huge and I tried to get the program to quit, but it won't. How do I stop this? PLEASE HELP!
  • Microsoft makes Outlook Express U-turn

    08/15/2003 10:30:34 AM PDT · by HAL9000 · 131 replies · 1,007+ views ^ | August 15, 2003
    Just days after announcing that it planned to halt development on Outlook Express, Microsoft has been forced to change its position following internal confusion and an outcry from customers. As reported earlier this week on Microsoft had planned to stop product development on Outlook Express, which forms part of the Internet Explorer code bundled with consumer versions of Windows. At the time Dan Leach, Office product manager, said: "The technology doesn't go away, but no new work is being done." Under that vision, consumers would have been directed towards the company's MSN software, while businesses would be encouraged...
  • Microsoft kills off Outlook Express

    08/13/2003 2:52:32 PM PDT · by HAL9000 · 65 replies · 614+ views
    ZDNet ^ | August 13, 2003 | Angus Kidman
    It might be the world's most widely distributed e-mail client, but Microsoft has confirmed that it has no intention of further developing Outlook Express. "[Outlook Express] just sits where it is," said Dan Leach, lead product manager for Microsoft's information worker product management group. "The technology doesn't go away, but no new work is being done. It is consumer e-mail in an early iteration, and our investment in the consumer space is now focused around Hotmail and MSN. That's where we're putting the emphasis in terms of new investment and new development work." While Outlook Express has always been...
  • Microsoft Outlook Express Patch Flawed

    10/11/2002 9:45:53 PM PDT · by Ernest_at_the_Beach · 8 replies · 328+ views
    EXTREMETECH .com ^ | October 11, 2002 | Dennis Fisher, eWEEK
    <p>Microsoft Corp. on Friday said that a patch it released Thursday for an Outlook Express vulnerability erroneously tells users they need a different version of Internet Explorer in order to install the fix. In fact, the patch requires IE 6, but users who have installed Service Pack 1 for the browser are already protected against the new flaw. Thus when these users try to install the new patch, they receive an error message.</p>