Free Republic 4th Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $22,963
27%  
Woo hoo!! And the first 27% is in!! Thank you all very much!!

Keyword: getamac

Brevity: Headers | « Text »
  • This Ipod Rocks!! (vanity)

    12/26/2005 8:18:33 PM PST · by The South Texan · 107 replies · 1,434+ views
    Self | 12/26/05 | Self
    Excuse the shameless and one once every six months vanity, but this Ipod Nano I got for Christmas Rocks! I am no old goat (33 Years old), but this thing has to be one of the most amazing pieces of technology I've had in my hand in awhile. Downloaded an old 80's U2 video an the playback is flawless. I used to be an Apple hater, but this has changed my mind. Go ahead a flame away Apple haters!
  • UGLY SPYAXE VIRUS ALERT (VANITY)

    12/06/2005 6:38:12 PM PST · by CAWats · 61 replies · 8,523+ views
    12-06-2005 | Cawats
    My computer apparently picked up a virus from spyaxe.net. I have a pop-up window saying I have spyware and "it is recommended to use antispyware tools to prevent data loss." Everytime I close the popup it pops up again. I got tired of closing it and installed it then removed it with "Add/Remove Software" in the control panel. The pop-up is back. Can anyone help?
  • Spy Axe 3.0

    12/06/2005 8:16:34 PM PST · by Carling · 87 replies · 5,144+ views
    My PC ^ | 12/6/05 | Me
    I hate vanity posts, but I am wondering if anyone in FR land knows anything about the Spy Axe 3.0 virus. It has set up shop in my toolbar and has hijacked my home page. eTrust isn't touching it. Help?!?!
  • Sony Rootkits: A Sign Of Security Industry Failure (List of 52 CD Titles)

    11/18/2005 3:16:07 PM PST · by Eagle9 · 32 replies · 1,324+ views
    TechWeb News ^ | November 18, 2005 | Gregg Keizer
    Sony's controversial copy-protection scheme had been in use for seven months before its cloaking rootkit was discovered, leading one analyst to question the effectiveness of the security industry. "[For] at least for seven months, Sony BMG Music CD buyers have been installing rootkits on their PCs. Why then did no security software vendor detect a problem and alert customers?" asked Joe Wilcox, an analyst with JupiterResearch. "Where the failure is, that's the question mark. Is it an indictment of how consumers view security software, that they have a sense of false protection, even when they don't update their anti-virus and...
  • MS' Reaction to Sony's Rootkit Raises Some Questions

    11/17/2005 6:09:52 AM PST · by ShadowAce · 79 replies · 1,658+ views
    Groklaw ^ | 13 November 2005 | Pamela Jones
    When the news first broke in the mainstream press that Windows expert and blogger Mark Russinovich (he wrote a book about Windows for Microsoft) had found that Sony's anti-piracy efforts had gone too far and that Sony's DRM was installing an undetectable rootkit on customers' computers which they couldn't safely remove, the first reaction from Microsoft was guarded. They were concerned, they said, and were evaluating what, if anything, to do: Microsoft, which also ships an anti-spyware program, recently renamed "Windows Defender," hasn't yet decided whether it will also flag the Sony DRM software as malicious code, the spokesperson said....
  • Sony has infected over one-half million world wide nets incl U.S. Military

    11/15/2005 1:43:21 PM PST · by dickmc · 109 replies · 4,396+ views
    Welcome to Planet Sony ^ | 2005-11-15 09:28 | Dan Kaminsky
    More than one-half million networks infected by Sony including U.S. military and various countries. Dan Kaminsky, http://www.doxpara.com/ ,is the expert who broke this and did the work. His U.S. and Europe infection maps are shown below and are frightening. Dan did a hell of a good job. Search Google News for "sony numbers trouble" for more in an excellent article today that is very worth reading.
  • First Trojan Using Sony DRM Spotted

    11/10/2005 10:03:29 AM PST · by steve-b · 29 replies · 1,611+ views
    The Register ^ | 11/10/05 | John Leyden
    Virus writers have begun taking advantage of Sony-BMG's use of rootkit technology in DRM software bundled with its music CDs. Sony-BMG's rootkit DRM technology masks files whose filenames start with "$sys$". A newly-discovered variant of of the Breplibot Trojan takes advantage of this to drop the file "$sys$drv.exe" in the Windows system directory....
  • Analyst: Viruses Pushing Windows Users To Mac

    11/09/2005 4:18:59 PM PST · by Vermonter · 175 replies · 2,174+ views
    Security Pipeline via Yahoo ^ | 11/8/2005 | Thomas Claburn
    Windows users are getting sick of computer viruses and are increasingly switching to Macs, according to a research note issued on Monday by New York-based investment firm Needham & Co. The report downgrades Apple's stock from a buy to a hold based on the high price of the computer company's shares. But it cautions that "the frenetic pace of innovation at Apple could present new opportunities," which might merit a higher share valuation. Much of that innovation of late has involved the iPod, specifically the company's video-capable fifth generation iPod and its iPod Nano. On October 11, Apple reported the...
  • Mac OS X inherently secure, hackers not interested

    10/24/2005 10:52:07 AM PDT · by Panerai · 80 replies · 1,449+ views
    MacNN ^ | 10/24/2005
    Successful assaults by viruses and other malware on the Mac operating system are rare as it has better security and attackers are less keen, says Stephen Wildstrom of BusinessWeek. "There is endless debate among security experts about whether the paucity of successful assaults on Apple's OS X is attributable to better security or attackers' lack of interest in an operating system whose share of the market is in single digits. I think it's some of both." Wildstrom says one reason Mac OS X offers inherently better security is that it was designed with relatively little concern for compatibility with earlier...
  • Computer Help Requested: Invalid boot.ini file / CHKDSK /r /p freezes at 5% (posting in chat)

    09/30/2005 7:52:34 AM PDT · by jdm · 22 replies · 5,202+ views
    9-30-05
    Good morning fellow FReepers -- Been trying to "fix" my brother's computer. Upon booting, an error message is displayed: Invalid Boot.ini file Booting from c:\windows\ And then: Windows\System32\Config\System missing or corrupt. Can't get into safe mode. I booted from the XP Pro disc and ran the recovery console. Ran CHKDSK and am told: "The volume appears to be in good condition and was not checked. Use /p if you want to check the volume anyway." When running CHKDSK /p or CHKDSK /r the process hangs/freezes 5% in. I tried the command bootcfg /rebuild to no avail. The error is "Failed...
  • Now, Every Keystroke Can Betray You

    09/18/2005 5:35:49 PM PDT · by Crackingham · 52 replies · 2,567+ views
    LA Times ^ | 9/18/05 | Joseph Menn
    Bank customers know to shield their ATM passwords from prying eyes. But with the rise of online banking, computer users may not realize electronic snoops might be peeking over their shoulder every time they type. In a twist on online fraud, hackers and identity thieves are infecting computers with increasingly sophisticated programs that record bank passwords and other key financial data and send them to crooks over the Internet. That's what happened to Tim Brown, who had account information swiped out of the PC at his Simi Valley store. "It's scary they could see my keystrokes," said Brown, owner of...
  • HELP! I've Been Micro-Hosed

    08/18/2005 12:12:59 AM PDT · by lafroste · 82 replies · 1,678+ views
    Myself | lafroste
    I've had what started out as a minor problem with my computer escalate way out of control. Two nights ago I got impatient waiting for all the junk on my computer to load after an installation reboot. I hit the reboot program before I should have, it clashed with a just loading Zone Alarm, corrupted a Zone Alarm dll, and all heck broke loose.The corrupted file looped and brought my system to a standstill. I finally got it turned off (unless I highlight it or do anything to it at all), but I can't delete it (inpage error), I can't...
  • iBook sale erupts in chaos, stampede

    08/16/2005 10:10:33 PM PDT · by budman_2001 · 8 replies · 641+ views
    (Excerpt)PHOTOS as it happened: SlideshowMore Photos: SlideshowUPDATED: 8:08 p.m.Chaos erupted this morning at the Richmond International Raceway as thousands of people stampeded through the gates in a rush to buy used iBook laptop computers for $50 each.There were several minor injuries and one person was taken to a hospital with a leg injury, fire Battalion Chief Steve Wood said during a 1 p.m. news conference. In all, 17 people were treated, the majority for heat- or diabetic-related problems, he said.Thousands of Henrico County residents and/or taxpayers stood in a half-mile-long line as dawn broke while others waited in cars parked...
  • Microsoft sees 3 'critical' Windows security flaws

    08/09/2005 2:03:40 PM PDT · by Fractal Trader · 49 replies · 1,297+ views
    AP via Boston.com ^ | 9 August 2005
    Microsoft Corp. warned users of its Windows operating system on Tuesday of three newly found "critical" security flaws in its software, including one that could allow attackers to take complete control of a computer. Computer security experts urged users to download and install the patches, which are available at www.microsoft.com/security. "Users (should) apply the updates as quickly as possible," said Oliver Friedrichs, senior manager of Symantec Security Response, part of security software company Symantec Corp. SYMC.O. Microsoft said that vulnerabilities exist in its Internet Explorer Web browser, the most severe of which could allow an attacker to take complete control...
  • Microsoft fixes serious Windows flaws

    08/09/2005 2:56:44 PM PDT · by Panerai · 78 replies · 1,798+ views
    Cnet News ^ | August 9, 2005 | Joris Evers
    Microsoft on Tuesday issued alerts on several security flaws in Windows, the most serious of which could allow an attacker to gain control over a victim's computer. Microsoft released six security bulletins as part of its monthly patching cycle, three of which it deems "critical." The Redmond, Wash., software gives that rating to any security issue that could allow a malicious Internet worm to spread without any action required on the part of the user. One bulletin addresses three flaws in Internet Explorer. Of all the issues Microsoft offered fixes for Tuesday, these put users at most risk of attack,...
  • Spyware Phishing Now a World-Wide Epidemic

    07/19/2005 10:06:47 PM PDT · by ex-Texan · 16 replies · 906+ views
    Itsecurity.com ^ | 7/19/205 | Staff Writers
    Nova Scotia July 19, 2005 -- SpyCop today announced that the use of commercial monitoring spy software is on the rise in Internet phishing schemes, the latest scam used to steal personal information and even entire identities. The Anti-Phishing Working Group, web site at www.antiphishing.org, explains: "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials... Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware." The commercial spy software market has made available over 525 payware spy programs which include URL recorders, keyloggers, chat...
  • Corrupted PC's Find New Home In the Dumpster

    07/16/2005 11:54:18 AM PDT · by summer · 82 replies · 2,085+ views
    The NY Times - Business Section ^ | July 17, 2005 | MATT RICHTEL and JOHN MARKOFF
    SAN FRANCISCO, July 15 - Add personal computers to the list of throwaways in the disposable society. On a recent Sunday morning when Lew Tucker's Dell desktop computer was overrun by spyware and adware - stealth software that delivers intrusive advertising messages and even gathers data from the user's machine - he did not simply get rid of the offending programs. He discarded the whole computer. Mr. Tucker, an Internet industry executive who holds a Ph.D. in computer science, decided that rather than take the time to remove the offending software, he would spend $400 on a new machine. He...
  • Critical fixes for Windows, Office coming

    07/07/2005 1:27:43 PM PDT · by Panerai · 17 replies · 948+ views
    Cnet News ^ | 07/07/2005 | Joris Evers
    As part of its monthly patching cycle, Microsoft on Tuesday plans to release three security alerts for flaws in Windows and Office. Two of the security bulletins apply to Windows, and at least one of them is deemed "critical," Microsoft's highest risk rating, the company said in a notice posted on its Web site Thursday. Its Office productivity suite will get one bulletin, also rated critical. The notice did not specify whether one of the patches will be for Internet Explorer. Microsoft earlier this week offered a workaround for a known flaw in the Web browser that opens the door...
  • Can You Trust Your Spyware Protection?

    05/31/2005 6:41:03 PM PDT · by El Conservador · 92 replies · 2,735+ views
    PCWorld.com through Yahoo! News ^ | May 31, 2005 | Andrew Brandt
    The next time you run a scan with your anti-spyware tool, it might miss some programs. Several anti-spyware firms, including Aluria, Lavasoft, and PestPatrol, have quietly stopped detecting adware from companies like Claria and WhenU--a process called delisting. Those adware companies have been petitioning anti-spyware firms to delist their software; other companies have resorted to sending cease-and-desist letters that threaten legal action. In most cases it's difficult for customers to determine whether their anti-spyware tool has delisted anything and, if so, which adware it skips. "When a spyware program gets delisted, users won't be aware of its presence," says Harvard...
  • XP Questions

    05/12/2005 8:38:33 PM PDT · by maui_hawaii · 26 replies · 440+ views
    I am running MS XP home version on my laptop. For some reason the clock in the lower right hand corner always reads in military time. I do not want to try to figure out when 22:00 is. How can I change it to make it read normal people time like "7:05" etc?
  • New VIRUS threat Sober.p (4% of emails contain .zip files-DO NOT OPEN!)

    05/04/2005 5:16:08 PM PDT · by Las Vegas Dave · 95 replies · 2,740+ views
    Virus Name Risk Assessment W32/Sober.p@MM Corporate User : Low-Profiled Home User : Medium Virus Information Discovery Date: 05/02/2005 Origin: Unknown Length: 53,727 bytes (zip) 53,554 bytes (executable) Type: Virus SubType: E-mail Minimum DAT: 4443 (03/09/2005) Updated DAT: 4482 (05/02/2005) Minimum Engine: 4.3.20 Description Added: 05/02/2005 Description Modified: 05/02/2005 3:59 PM (PT) Description Menu Virus Characteristics Symptoms Method Of Infection Removal Instructions Variants / Aliases Rate This page Print This Page Email This Page Legend Virus Characteristics: -- Update 2nd May 13:00 PST -- Due to increased prevalence, this threat has had its risk assessment raised to MEDIUM for Home Users....
  • Apple Mythology and Desktop Security

    04/21/2005 8:04:29 PM PDT · by coon2000 · 30 replies · 914+ views
    Yahoo News ^ | Thu Apr 21, 2:03 PM ET | Paul Murphy, cio-today.com
    Two weeks ago theregister.co.uk summarized an analysis (done by Quocirca) of reader response to questions on Linux desktop migration. To no one's surprise, the study found that business people cite the opportunity to sidestep the insecurity of the Microsoft (Nasdaq: MSFT - news) PC, not cost savings, as the primary reason for considering desktop Linux. Most respondents agreed, furthermore, that the high cost of matching Windows applications, particularly Microsoft Office and custom applications, is the greatest barrier to change. What's most interesting about this is what it reveals about the respondents: specifically that they're so focused on fighting Microsoft's alligators...
  • Microsoft Internet Explorer MSHTML.DLL CSS Handling Remote Buffer Overflow Vulnerability

    03/09/2005 10:48:17 AM PST · by B Knotts · 30 replies · 1,147+ views
    SecurityFocus ^ | 3/9/2005
    Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself when the application handles a malformed CSS file. A typical attack would involve the attacker creating a Web site that includes the malicious CSS file. The attacker may then entice a vulnerable user to visit the site. If successful, this attack may result in granting the attacker unauthorized access to the affected computer in the context of the user running Internet Explorer.
  • Worm.Win32.Sober.L Alert!(Save your Computer Data)

    03/09/2005 6:19:11 AM PST · by OPS4 · 34 replies · 2,335+ views
    Emmissoft | Wed. March 9 2005 | a-squared
    Important information about current security risks. Worm.Win32.Sober.L Alert! A new variant of the Sober worm is spreading fast. As it's predecessors, Sober.L spreads as an email attachment in emails which are sent to all email addresses found on the victim's harddisk. Even if the executable file is packed in a .ZIP file, many users open the file and activate the worm this way. For novice users it's hard to see that it is a worm generated email because the email subject is "your password + accountnumber !". The email body text is the following: hi, i've got an admin mail...
  • Hackers Quickly Target Newly Disclosed Microsoft Flaw

    02/10/2005 7:31:00 PM PST · by Eagle9 · 27 replies · 899+ views
    TechWeb - InternetWeek.com ^ | February 10, 2005 | Gregg Keizer
    It didn't take hackers long to start banging hard on the vulnerabilities Microsoft disseminated Tuesday. Just a day after the Redmond, Wash.-based developer rolled out a dozen advisoriescontaining 16 vulnerabilities, 10 of them tagged as "Critical," exploit code has gone public for one, Microsoft said late Wednesday. "Microsoft won't be happy that someone has posted information about how to take advantage of their critical security hole within 48 hours of their patch being released," said Graham Cluley, senior technology consultant for Sophos, in a statement. "Many computer users are bound to have not yet defended themselves," he added. Microsoft posted...
  • Microsoft Fesses Up To 19 Vulnerabilities, MSBlast-Level Worm Likely

    02/08/2005 2:32:00 PM PST · by Eagle9 · 25 replies · 1,255+ views
    TechWeb ^ | February 08, 2005 | Gregg Keizer
    Microsoft Tuesday released its largest group security patches in nearly a year as it posted 12 security bulletins encompassing 19 vulnerabilities, 14 of which it marked "Critical," its highest patch-now warning. Among them is a vulnerability that will likely lead to the biggest, baddest worm in since mid-2003, said Mike Murray, the director of research at vulnerability management vendor nCircle. "There's a clear 'winner' here," said Murray. " MS05-011 fixes a vulnerability in SMB [Server Message Block], which is running on every version of Microsoft's operating systems that a corporation might be using. And it's exploitable remotely, so it doesn't...
  • Microsoft To Release 13 Patches Next Week

    02/03/2005 1:53:24 PM PST · by Eagle9 · 62 replies · 1,679+ views
    TechWeb ^ | February 3, 2005 | TechWeb News
    Microsoft on Thursday gave early warning that next week's monthly dose of security bulletins and patches will be among its biggest ever. According to the Advance Notification service, which pre-announces upcoming patches but limits the information disclosed, next Tuesday's roundup will include 13 security bulletins, at least three of which will be marked "Critical," the Redmond, Wash.-based developer's most dire warning. Nine of the bulletins affect Microsoft Windows. That's a much-higher-than-normal number, and three times what the company published in January. Other patches will be published to fix bugs in SharePoint Services, Microsoft Office, the .Net Framework, Visual Studio, Windows...
  • Bropia worm spreads on the back of MSN Messenger

    02/03/2005 8:12:50 AM PST · by PeterFinn · 14 replies · 1,053+ views
    Computer Buyer ^ | Monday 24th January 2005 | Matt Whipp
    Bropia worm spreads on the back of MSN Messenger 5:04PM A new virus is using the MSN Messenger system to spread. Known as Bropia.A, the worm waits on an infected system until the Messenger window is opened and then sends a copy of itself to contacts, using filenames adaware.exe, VB6.EXE, lexplore.exe and Win32.exe. If a contact accepts the file and runs it, it checks to see if any of the previously mentioned files are present, and if not, places a file called oms.exe on the computer and runs it. This is a variant of Rbot, which installs a backdoor on...
  • Microsoft: Legit Windows or no updates

    01/26/2005 1:59:43 PM PST · by Happy2BMe · 418 replies · 5,210+ views
    Aiming to crack down on counterfeit software, Microsoft plans later this year to require customers to verify that their copy of Windows is genuine before downloading security patches and other add-ons to the operating system. Since last fall the company has been testing a tool that can check whether a particular version of Windows is legitimate, but until now the checks have been voluntary. Starting Feb. 7, the verification will be mandatory for many downloads for people in three countries: China, Norway and the Czech Republic. In those countries, people whose copies are found not to be legitimate can get...
  • Microsoft Responds To IE Security Concerns

    01/18/2005 12:48:29 PM PST · by stainlessbanner · 40 replies · 1,193+ views
    infoweek ^ | Jan. 18, 2005 | Microsoft
    Full text of a letter from Microsoft, in response to coverage of companies moving from IE to Firefox and other alternative browsers. InformationWeek Editor's note: the following is the full text of Microsoft's response to an InformationWeek.com poll and related story regarding Internet Explorer, and whether companies are switching to the Mozilla browser. It came from Waggener Edstrom, Microsoft's public-relations agency. You mentioned that many or the respondents in the self-selecting survey recommended against IE and that many people have said Microsoft needs to address security issues more fully. Regarding the recommendation, we're aware that some people have recommended against...
  • Microsoft Readies 'A1' Security Subscription Service for its anti-spyware and anti-virus solutions.

    01/05/2005 10:38:14 AM PST · by Happy2BMe · 110 replies · 2,294+ views
    Tuesday, January 04, 2005 Microsoft Readies 'A1' Security Subscription Service By Mary Jo Foley Microsoft's anti-virus/anti-spyware strategy is taking shape. Sources say Redmond's prepping a fee-based bundle, which could go beta soon. Publicly, Microsoft continues to be cagey about packaging and pricing plans for its anti-spyware and anti-virus solutions. But privately, Microsoft has begun informing partners of its plans for a security subscription service code-named "A1," according to developers who requested anonymity. Microsoft bought anti-virus vendor GeCAD in the summer of 2003, and anti-spyware maker Giant Company Software last month. As to how it plans to deliver these technologies, Microsoft...
  • Microsoft Offers Virus-Removal Programs

    01/06/2005 8:29:46 AM PST · by GeneD · 38 replies · 1,922+ views
    AP via Yahoo! News ^ | 01/06/2005 | Ted Bridis
    WASHINGTON - Microsoft Corp., whose popular Windows software is a frequent target for Internet viruses, is offering a free security program to remove the most dangerous infections from computers. The program, with monthly updates, is a step toward plans by Microsoft to sell full-blown antivirus software later this year. Microsoft said Thursday that consumers can download the new security program from the company's Web site — www.microsoft.com — and that updated versions will be offered automatically and free each month. It will be available starting Tuesday. Also, Microsoft offered Thursday a free program to remove "spyware," a category of irritating...
  • Ballmer's Email - Indemnification Comes Full Circle

    10/28/2004 6:56:01 AM PDT · by ShadowAce · 17 replies · 716+ views
    Groklaw ^ | 27 October 2004 | Pamela Jones
    Just 6 easy steps, and we come full circle on the indemnification story: 1. First, we had SCO announcing it was suing IBM and threatening Linux users for contributory copyright infringement. 2. Then the chorus broke out in song about how Linux has no indemnification. 3. Then we found out from BayStar's lips that Microsoft inspired them to invest in SCO, an investment that made all the lawsuits financially possible. Thanks for nothing, BayStar. 4. Meanwhile, the Linux world began setting up indemnification and legal funds for Linux users and developers.5. SCO sued everybody else. Terror ensued, sorta, briefly. 6....
  • Microsoft's Ballmer Warns Asia of Linux Lawsuits (Microsoft pulls a SCO in Asia)

    11/18/2004 8:48:26 AM PST · by Prime Choice · 147 replies · 8,814+ views
    Reuters ^ | 11/18/2004 | Reuters
    SINGAPORE (Reuters) - Microsoft Corp. Chief Operating Officer Steve Ballmer on Thursday warned Asian governments that they could face intellectual rights-infringement lawsuits for using rival open-source operating platforms such as Linux. Linux is open-code software that is freely available on the Internet and easily modified by users. Its growing popularity with companies and governments around the world, and particularly in Asia, is a threat to the global dominance of Microsoft's proprietary Windows platform. Ballmer, speaking in Singapore at Microsoft's Asian Government Leaders Forum, said that Linux violated more than 228 patents. He did not provide any detail on the alleged...
  • New Windows virus tempts users with game of Tetris

    01/13/2005 6:15:02 AM PST · by yankeedame · 13 replies · 580+ views
    BBC On-Line ^ | Thursday, 13 January, 2005 | staff writer
    Last Updated: Thursday, 13 January, 2005, 11:29 GMT Windows worm travels with Tetris The version of Tetris is recognisable and just as playable. Users are being warned about a Windows virus that poses as the hugely popular Tetris game. The Cellery worm installs a playable version of the classic falling blocks game on PCs that it has infected. While users play the game, the worm spends its time using the machine to search for new victims to infect on nearby networks. The risk of infection by Cellery is thought to be very low as few copies of the worm have...
  • Tetris game hides Cellery worm ( Windows only though )

    01/14/2005 12:34:07 PM PST · by Ernest_at_the_Beach · 7 replies · 322+ views
    vnunet.com ^ | 13 Jan 2005 | Robert Jaques
    Tetris game hides Cellery worm Worm uses cult game to spread via email Robert Jaques, vnunet.com 13 Jan 2005 A worm, dubbed Cellery-A (W32/Cellery-A), which poses as a playable version of the classic Russian computer game Tetris has been detected in the wild, security experts have warned.The Cellery worm, which gets its name from a message it displays saying 'Chancellery', makes changes to Windows settings to ensure that it automatically runs when the operating system starts up.While the Tetris-like arcade game is running, the worm plays a MIDI music tune, and searches for other network drives and attached computers to...
  • Flaws in the security features of (Windows)SP2

    08/18/2004 5:54:56 AM PDT · by Salo · 12 replies · 739+ views
    Heise Security ^ | 08/13/04 | Jürgen Schmidt
    Flaws in SP2 security features Author: Jürgen Schmidt, heise Security Date: August 13,2004 German Advisory: http://www.heise.de/security/artikel/50046 English Version: http://www.heise.de/security/artikel/50051 Overview With Service Pack 2, Microsoft introduces a new security feature which warns users before executing files that originate from an untrusted location (zone) such as the Internet. There are two flaws in the implementation of this feature: a cmd issue and the caching of ZoneIDs in Windows Explorer. The Windows command shell cmd ignores zone information and starts executables without warnings. Virus authors could use this to spread viruses despite the new security features of SP2. Windows Explorer does not...
  • Study: Unpatched PCs compromised in 20 minutes

    08/18/2004 10:04:30 AM PDT · by glorgau · 86 replies · 2,414+ views
    News.com ^ | August 17, 2004, 12:22 PM PDT | Matt Loney and Robert Lemos
    Don't connect that new PC to the Internet before taking security precautions, researchers at the Internet Storm Center warned Tuesday. According to the researchers, an unpatched Windows PC connected to the Internet will last for only about 20 minutes before it's compromised by malware, on average. That figure is down from around 40 minutes, the group's estimate in 2003. The Internet Storm Center, which is part of the SANS Institute, calculated the 20-minute "survival time" by listening on vacant Internet Protocol addresses and timing the frequency of reports received there. "If you are assuming that most of these reports are...
  • Attention SBC Yahoo! customers who use Windows XP Operating System

    08/18/2004 11:25:01 AM PDT · by hsmomx3 · 16 replies · 3,624+ views
    email | SBC/YAHOO
    Dear SBC Yahoo! Member: If you are using the Windows XP Operating System on any of your computers connected to SBC Yahoo! Dial or SBC Yahoo! DSL, this courtesy message is for you. Users of other operating systems are not affected. In August, Microsoft Corporation will be offering Windows XP users an update called "Service Pack 2". You may hear about the Service Pack 2 update in the news, on the Internet, or by seeing prompts on your computer screen telling you to load a "Critical Upgrade" to Windows. Service Pack 2 provides a series of security enhancements for the...
  • Microsoft Patches the Patch

    08/19/2004 6:53:52 PM PDT · by PAR35 · 12 replies · 904+ views
    PC World ^ | 8/19/04 | Stuart J. Johnston
    Microsoft is only partway into delivering the long-awaited Service Pack 2 for Windows XP to users, yet it has already begun releasing fixes for problems that the mammoth update can cause, however inadvertently. The company has issued what is likely the first of several "hotfix" patches, which developers and analysts say are just a fact of PC life. *** This first hotfix for Windows XP SP2 patches a problem that SP2 creates for some users of virtual private networks, telecommunications software that is generally used to let workers connect securely--usually to a corporate computer--from a remote location such as home...
  • Researchers spot XP SP2 security weakness

    08/21/2004 6:37:02 AM PDT · by Salo · 18 replies · 854+ views
    vnunet.com ^ | 08/20/2004 | Iain Thomson
    Researchers spot XP SP2 security weakness IE drag and drop feature could be exploited by hackers Iain Thomson, vnunet.com 20 Aug 2004 Security researchers believe they have discovered a weakness in the new security given to Windows XP by the recently unveiled Service Pack 2 (SP2). Since XP SP2 was released, activists have been searching for weaknesses in the security-focused service pack. Microsoft yesterday dismissed claims by German researchers to already have discovered a flaw. Now a group has claimed that exploit code could bypass the new security procedures in XP by using the 'drag and drop' features of Internet...
  • IE Flaw Affects Windows XP SP2 Systems

    08/22/2004 9:00:43 AM PDT · by Happy2BMe · 34 replies · 1,147+ views
    The "highly criticial" vulnerability affects Internet Explorer 5.01, 5.5, and 6 on fully patched PCs running either Windows XP SP1 or the newer SP2.By Gregg Keizer, TechWeb News   Another flaw in Internet Explorer has been uncovered by Danish security firm Secunia, which said that the gaffe left all PC users open to attack, even those who had updated Windows XP with the massive Service Pack 2 upgrade. According to the alert that Secunia posted Thursday on its Web site, the vulnerability affects Internet Explorer 5.01, 5.5, and 6 on fully patched PCs running either Windows XP SP1 or...
  • Microsoft Warns of Critical JPEG Flaw: Image Handling Could Allow Takeover of a PC.

    09/14/2004 7:38:39 PM PDT · by IncPen · 21 replies · 1,393+ views
    IDG News - PC World ^ | 9.14.04 | Joris Ivers
    A security flaw in the way many Microsoft applications process JPEG images could allow an attacker to gain control over a computer running the software, Microsoft warned this week. Any program that processes JPEG images could be vulnerable, Microsoft says in Security Bulletin MS04-028. To take advantage of the flaw, an attacker would have to persuade a user to open a specially crafted image file. The image could be hosted on a Web site, included in an e-mail or Office document, or hosted on a local network, Microsoft says. A wide range of Microsoft software, including various versions of its...
  • Net security threats growing fast

    09/20/2004 5:30:58 AM PDT · by Bloody Sam Roberts · 29 replies · 1,217+ views
    BBC News | Technology ^ | 9/20/04 | BBC News
    More than 30,000 PCs per day are being recruited into secret networks that spread spam and viruses, a study shows. Six months ago only 2,000 Windows machines per day were being recruited into these so-called bot nets. Experts say the numbers are growing quickly because the remotely controlled networks are so useful to people who profit from hacking and virus writing. The figures came to light in Symantec's biannual Internet Threat Report which traces trends in net security. Hidden harm Nigel Beighton, a member of Symantec's Threat Team, said the number of PCs being enrolled in these networks was...
  • How to Protect Yourself From Vandals, Viruses If You Use Windows

    09/22/2004 7:12:29 PM PDT · by Swordmaker · 8 replies · 353+ views
    The Wall Street Journal - Tech Pages ^ | 9/16/2004 | WALTER S. MOSSBERG
    If you use a Windows personal computer to access the Internet, your personal files, your privacy and your security are all in jeopardy. An international criminal class of virus writers, hackers, digital vandals and sleazy businesspeople wakes up every day planning to attack your PC. And the company that controls the Windows platform, Microsoft, has made this too easy to do by carelessly opening numerous security holes in the operating system and its Web browser. Even if you install the recent Service Pack 2 update to Windows XP, you will still be vulnerable. As I have said before, I believe...
  • Blocking JPEGs No Defense Against Windows Vulnerability

    09/22/2004 9:16:18 PM PDT · by Eagle9 · 28 replies · 1,244+ views
    TechWeb ^ | September 21, 2004 | Gregg Keizer
    One of the standard security tactics enterprises apply won't work when defending PCs against threats posed by the image processing flaw found last week in Windows and numerous applications, security experts said Tuesday. The JPEG bug in Windows XP and Windows Server 2003, as well as in a host of both Microsoft and non-Microsoft applications, can't be defended by blocking JPEG images at the gateway, said John Pescatore, vice president of Gartner's Internet security group. "You can't simply block against this threat by file extension," said Pescatore, "since hackers could simply rename the file type and Windows would still process...
  • Code to exploit Windows graphics flaw now public

    09/23/2004 6:12:16 AM PDT · by rit · 22 replies · 1,452+ views
    Cnet News ^ | September 22, 200 | Robert Lemos
    A sample program hit the Internet on Wednesday, showing by example how malicious coders could compromise Windows computers by using a flaw in the handling of a widespread graphics format by Microsoft's software. Security professionals expect the release of the program to herald a new round of attacks by viruses and Trojan horses incorporating the code to circumvent security on Windows computers that have not been updated. The flaw, in the way Microsoft's software processes JPEG graphics, could allow a program to take control of a victim's computer when the user opens a JPEG file. "Within days, you'll likely see...
  • JPEG GDI+ Trojan Unleashed

    09/28/2004 2:15:28 AM PDT · by HAL9000 · 139 replies · 6,040+ views
    winnetmag.com ^ | September 28, 2004
    It was only a matter of time before someone unleashed malware that exploits the JPEG GDI+ vulnerability. Over the last two weeks various people have released proof of concept code in stages. The first code base that consisted of a corrupted JPG image file that caused an application to crash. The second code based was a JPG image that spawned a local command shell with no remote access. Within hours of the second code base released another person claimed to have made the command shell bind to a port for remote access.  Now someone has taken matters to a greater extreme by unleashing...
  • US-Cert Cyber Security Alert SA04-286A: Multiple Vulnerabilities in Microsoft Products

    10/12/2004 3:09:09 PM PDT · by Stoat · 3 replies · 501+ views
    U.S. Computer Emergency Readiness Team ^ | October 12, 2004 | U.S. Computer Emergency Readiness Team
    Home | FAQ | Contact | Privacy Policy | Unsubscribe from Alerts Search US-CERT > Advanced Search National Cyber Alert System Cyber Security Alert SA04-286A Multiple Vulnerabilities in Microsoft Windows, Internet Explorer, and Excel Original release date: October 12, 2004 Last revised: -- Source: US-CERT  Systems Affected Microsoft Windows Microsoft Internet Explorer Microsoft Excel, including Macintosh versions  Overview By taking advantage of one or more vulnerabilities in Microsoft products, an attacker may be able to take control of your computer.  Solution Apply updates Microsoft has released security updates for a number of products, including Windows, Internet Explorer, and Excel....
  • Microsoft Releases 10 Security Updates, Seven Critical

    10/12/2004 3:59:59 PM PDT · by NewMediaFan · 13 replies · 1,016+ views
    Tampa Bay Online ^ | Oct 12, 2004 | Allison Linn, The Associated Press
    SEATTLE (AP) - Microsoft Corp. released 10 security fixes for various products Tuesday, including seven that fix flaws the company said pose the highest threat to users. The new patches apply to a variety of products, including some versions of Microsoft's Windows operating system and server software, its Internet Explorer Web browser and Excel spreadsheet program. The seven critical flaws could allow an attacker to take control of a user's computer, while three other fixes deemed "important" - the second-highest rating - pose less of a threat. ' The Redmond software giant also rereleased a patch it put out last...