Free Republic 2nd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $62,625
77%  
Woo hoo!! And we're now over 77%!! Thank you all very much!! God bless.

Keyword: internetexploiter

Brevity: Headers | « Text »
  • IE Flaw Exploited (Internet Explorer has become an even bigger security risk)

    01/11/2005 3:19:05 AM PST · by Happy2BMe · 51 replies · 1,650+ views
    E Flaw Exploited Security firm identifies exploit technique for known browser hole. Matthew Broersma, Techworld.com Friday, January 07, 2005 Internet Explorer has become an even bigger security risk--even under Windows XP SP2--with the publication of a new and extensive exploit. Advertisement Security researchers have warned that the exploit, which takes advantage of known loopholes in SP2, could allow an attacker to run script code on a user's system via a specially crafted Web page. Known Hole The holes involved have been known publicly for more than two months, but previous exploit techniques required the user to take actions such as...
  • Browsers: A return to arms

    01/01/2005 7:42:06 AM PST · by holymoly · 62 replies · 2,066+ views
    C|Net News ^ | 01/01/05 | Paul Festa
    For a market segment Microsoft was said to have won decisively in the mid-1990s, the company spent a lot of time in 2004 putting out fires on the browser front. Like the ghost of the Netscape browser rising to haunt its slayer, Firefox emerged with a vengeance from the Mozilla open-source group, which was founded by Netscape in 1998 and last year spun off by parent company Time Warner. Firefox started off the year a prerelease, name-challenged project by a group that had lost much of its credibility after chronic delays and significant setbacks. But Firefox ended 2004 as a...
  • Media Files That Spread Spyware (Ben Edelman On WMP Installing 31! Programs On His PC Alert)

    01/03/2005 1:51:12 AM PST · by goldstategop · 30 replies · 9,908+ views
    Bendedelman.org ^ | 01/02/02 | Ben Edelman
    Users have a lot to worry about when downloading and playing media files. Are the files legal? Can their computers play the required file formats? Now there's yet another problem to add to the list: Will a media file try to install spyware? When Windows Media Player encounters a file with certain "rights management" features enabled, it opens the web page specified by the file's creator. This page is intended to help a content providers promote its products -- perhaps other music by the same artist or label. But the specified web page can show deceptive messages, including pop-ups that...
  • Google removes Trojan ads

    01/03/2005 3:51:05 PM PST · by holymoly · 5 replies · 1,048+ views
    heise online ^ | 01/03/2005 | Craig Morris
    Search engine operator Google has blocked ads that attempt to exploit security holes in the Internet Explorer. In the past few days, Google has been displaying context-sensitive ads on the right margin from its program partner AdWords that link to sites with dangerous JavaScript for various search terms such as "Preisvergleich" (price comparison) and "Gebraucht PC" (used PC). If you clicked on one of the links in the Internet Explorer, a JavaScript attempted to install spyware on your system. And the normal list of hits also included a lot of sites with Trojans. This Monday, Google reacted to the problem...
  • Is this internet prodigy about to knock Microsoft off its pedestal? Bill Gates' nightmare? FIREFOX

    01/04/2005 4:26:26 PM PST · by Coleus · 274 replies · 3,562+ views
    Times Online ^ | 01.04.05
    Modest pioneer: Blake Ross. At 7, he was a computer game addict. At 17, he made the breakthrough that created Firefox. At 19, he is a student of computer science (DAVID ADAME) Is this internet prodigy about to knock Microsoft off its pedestal?By David AdamsA Miami teenager has created a free web browser that has been called Bill Gates's worst nightmare   A MIAMI teenager is basking in the glory of helping to create a new internet browser at 17 that is now challenging the grip of Microsoft, which once held a virtual monopoly on web surfing.Computer analysts say...
  • eBay Drops Microsoft Authentication

    12/30/2004 7:24:30 PM PST · by Straight Vermonter · 15 replies · 909+ views
    TheStreet.com ^ | 12/31/04 | Troy Wolverton
    eBay (EBAY:Nasdaq - news - research) is dropping its support for Microsoft's (MSFT:Nasdaq - news - research) authentication service, the auction company announced this week. By late January, eBay users will no longer be able to log into the auction site using Microsoft's Passport system, eBay said in a post on its announcement board for users. eBay also will stop sending alerts to buyers and sellers' computers and mobile phones through the software giant's .Net service. eBay spokesman Hani Durzy declined to comment on why the company decided to drop support for Passport. But in a report by Reuters, Durzy...
  • Windows XP users Phelled by new Trojan [Symantec bulletin, SP2 no protection, will see 2 IE popups]

    12/30/2004 12:42:15 PM PST · by Mike Fieschko · 279 replies · 6,441+ views
    The Register ^ | Dec 30, 2004 | Ashlee Vance
    A new Trojan horse - named Phel - that punishes users of Microsoft Windows XP operating system is in the wild. Security software firm Symantec has issued a bulletin warning Windows XP users to be on the look out for the program, which is distributed as an .html file. The malicious code can attack systems running XP Service Pack 2. The vuln was first found in October, and Microsoft is busy trying to catch up to it. "Microsoft is taking this vulnerability very seriously, and an update to correct the vulnerability is currently in development," the company told ComputerWorld....
  • New Windows Bugs "Critical", Lack Patches

    12/27/2004 1:48:29 PM PST · by Eagle9 · 78 replies · 2,263+ views
    TechWeb News ^ | December 27, 2004 | Gregg Keizer
    A trio of new and unpatched vulnerabilities in Microsoft Windows were made public on security mailing lists over the weekend, nudging some security vendors to alert users that their systems may be open to attack and hijacking. The vulnerabilities, first reported by a Chinese group and then posted to the Bugtraq mailing list, are in Windows' LoadImage API function, its animated cursor files, and in the way it handles help files. All of the bugs are as yet unpatched. All currently-supported versions of Windows -- Windows NT, 2000, XP, and Windows Server 2003 -- are affected by the three flaws,...
  • European Court Rules Against Microsoft [It's WAR against American businesses!]

    12/22/2004 5:46:32 AM PST · by Brilliant · 62 replies · 990+ views
    AP via Yahoo! ^ | December 22, 2004 | RAF CASERT
    BRUSSELS, Belgium - A European Union court ruled Wednesday that Microsoft Corp. must immediately divulge some trade secrets to competitors and produce a version of its flagship Windows operating system stripped of the program that plays music and video. The 91-page ruling effectively thwarts Microsoft's attempt to delay, pending appeal, implementation of the EU's landmark antitrust decision in March that demanded changes in the software giant's business practices. The implications for Microsoft are huge, though the company did not immediately disclose whether it intended to offer a version of Windows without the Media Player in Europe alone or more broadly....
  • How Spyware Took The Next-Gen Threat Crown (On The Internet's No #1 Threat Today MUST READ!!!)

    12/21/2004 2:39:48 AM PST · by goldstategop · 168 replies · 7,612+ views
    ESecurityPlanet.com ^ | 12/20/04 | Sonny Discini
    Spyware used to be defined as applets, cookies or any other method used to collect statistics on your browsing habits. Gone are the days of such a benign interpretation. Spyware has evolved into a problem that surpasses those posed by traditional worms, viruses and Trojans. Today, these once relatively innocuous apps have evolved from anonymous, and often invisible, traffic statistics gatherers into beasts capable of crippling your PC's performance by installing unwanted toolbars, pop-up ads, desktop icons and many other nuisances. If that's not bad enough, some Spyware will modify system files, change security zone settings, keylog your sessions, spawn...
  • New Microsoft Patch Blocks Firefox Downloads

    12/19/2004 5:04:56 AM PST · by clyde asbury · 42 replies · 5,697+ views
    Scrappleface ^ | 12/19/04 | Scott Ott
    December 19, 2004 New Microsoft Patch Blocks Firefox Downloads by Scott Ott (2004-12-19) -- Microsoft Corp. today released a new security patch for its Internet Explorer (IE) web browser which prevents users from accidentally or intentionally downloading the new free, open-source Firefox browser from The Mozilla Foundation. "Firefox is a dangerous and contagious browser that could seriously jeopardize marketshare ," said an unnamed Microsoft spokesman. "Unless consumers take action to block Firefox, it could speed up web surfing and return control of user computers to the users themselves." The source added that Internet Explorer is a superior product because it...
  • Massive IE phishing exploit discovered

    12/17/2004 7:03:17 AM PST · by holymoly · 53 replies · 2,147+ views
    ZDNet ^ | December 17, 2004 | Dan Ilett
    Even SP2 versions of Microsoft's Internet Explorer are vulnerable to a spoofing exploit published yesterday. A vulnerability researcher posted details of a dangerous Internet Explorer (IE) flaw on Thursday that allows phishers to spoof Web sites more realistically than ever before. According to security company Secunia, Paul from Greyhats -- a research group -- has published details of a vulnerability that can be exploited to spoof the content of any Web site. Using the exploit, scammers are able to manipulate all versions of IE, including Windows XP SP2 -- the latest and most secure version of the browser -- and...
  • Safe Personal Computing

    12/17/2004 6:37:05 AM PST · by zeugma · 69 replies · 2,270+ views
    Bruce Schneier BLOG ^ | December 13, 2004 | Bruce Schneier
    Schneier on Security A weblog covering security and security technology. December 13, 2004 Safe Personal Computing I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, "Nothing--you're screwed." But that's not true, and the reality is more complicated. You're screwed if you do nothing to protect yourself, but there are many things you can do to increase your security on the Internet. Two years ago, I published a list of PC security recommendations. The idea was to give home users concrete actions they could take to improve security. This is an...
  • Top 10 "Most Unwanted" Spyware Named

    12/14/2004 6:22:01 PM PST · by Ernest_at_the_Beach · 130 replies · 5,580+ views
    TechWeb ^ | December 10, 2004 (2:48 PM EST) | Gregg Keizer,
    A security firm named the top 10 spyware threats this week, saying that the secretly-installed software poses an "insidious" threat to consumers and corporations alike. Webroot, which makes end-user and enterprise editions of Spy Sweeper, used its relationship with Internet service provider EarthLink to tally the most prevalent spyware, then selected the worst based on its knowledge of how each works and the damage it can cause. "We use the P-I index," said Richard Stiennon, Webroot's vice president of threat research. "P is for prevalence, I is for insidiousness." Each of the ten spyware programs cited by Webroot was spotted...
  • New Trojan Virus poses as Lycos spam page

    12/09/2004 1:19:14 PM PST · by yankeedame · 19 replies · 819+ views
    News.Com.AU ^ | December 10, 2004 | staff writer
    New Trojan poses as Lycos spam page Correspondents in Paris December 10, 2004A VIRUS that spies on keystrokes and downloads passwords and bank account details is masquerading as a screensaver designed by internet portal Lycos to attack spammers, an internet security company has warned. Finnish anti-virus company F-Secure said the so-called Trojan horse started to be distributed among emails on Monday. The mail has the subject line "Be the first to fight spam with Lycos screen" and comes with an attachment entitled "Lycos screensaver to fight spam," F-Secure said on its website. Whoever downloads it unwittingly installs a spying programme...
  • Most Browsers Buggy, Even IE In XP SP2 (A new - Test your browser here)

    12/08/2004 8:34:03 PM PST · by Eagle9 · 101 replies · 2,773+ views
    TechWeb ^ | December 8, 2004 | TechWeb News
    A European security vendor warned Wednesday that most browsers sport a bug that hackers can exploit to spoof a Web site and trick users into trusting bogus pop-up windows. The vulnerability, which Danish security firm Secunia rated as "moderately critical" is similar to previous bugs in browsers that was disclosed in July and September of 2004. Attackers could use it to add content into a trusted Web site's window by, for instance, inserting a fake form in a pop-up window seemingly opened by that site. Affected browsers, said Secunia, include the popular Internet Explorer and the up-and-coming Firefox, as well...
  • Unprotected PCs Fall To Hacker Bots In Just Four Minutes

    11/30/2004 1:29:41 PM PST · by zeugma · 139 replies · 10,542+ views
    Techweb ^ | 11/30/2004 | Gregg Keizer
    Unprotected PCs Fall To Hacker Bots In Just Four Minutes By Gregg Keizer, TechWeb.com The lifespan of a poorly protected PC connected to the Internet is a mere four minutes, research released Tuesday claimed. After that, it's owned by a hacker. In the two-week test, marketing-communications firm AvanteGarde deployed half a dozen systems in "honeypot" style, using default security settings. It then analyzed the machines' performance by tallying the attacks, counting the number of compromises, and timing how long it took an attack to successfully hijack a computer once it was connected to the Internet. The six machines were equipped...
  • Phishers tapping botnets to automate attacks (criminals using home PCs to host baiting sites)

    11/27/2004 9:47:32 AM PST · by Stoat · 68 replies · 3,828+ views
    The Register (U.K.) ^ | November 26, 2004 | John Leyden
    Phishers tapping botnets to automate attacks By John Leyden Published Friday 26th November 2004 13:55 GMT Computer criminals are making phishing more potent by automating attacks. Anti-Phishing Working Group (APWG) analysts reckon fraudsters are using automated tools and botnets to ramp up attacks. It estimates attacks grew by an average of 36 per cent a month between July and October.Scam emails that form the basis of phishing attacks often pose as 'security check' requests from well-known businesses. These messages attempt to trick users into handing over their account details and passwords to bogus sites. The details collected this way are...
  • Java Bug Makes IE, Firefox Vulnerable ("Highly Critical" - Update Required)

    11/23/2004 11:39:35 PM PST · by Eagle9 · 51 replies · 5,287+ views
    TechWeb ^ | November 23, 2004 | TechWeb News
    A flaw in Sun's Java Virtual Machine can open up the two most popular browsers, Microsoft's Internet Explorer and Mozilla's Firefox, to attack, security researchers said Tuesday. According to Reston, Vir.-based iDefense and Danish security vendor Secunia, the bug in Java 2 Runtime Environment (JRE), Standard Edition could let attackers bypass the Java security "sandbox" and all security restrictions within Java applets on Web sites. JRE is the plug-in software that establishes a connection between the browser and the Java platform, and makes it possible for Web browsers to run Java applets stashed on Web sites. Hackers using the exploit...
  • Free Republic's Canada chapter is under attack

    11/21/2004 9:11:23 AM PST · by Entropy Squared · 176 replies · 7,076+ views
    Free Dominion ^ | November 21, 2004 | Entropy Squared
    Entropy Squared & conniewFree Dominion November 21, 2004 Under attack President Bush is coming to Canada for a visit on November 30 and December 1. The MSM in Canada is going to paint it as a disaster of some type and many assorted Canadian leftists are planning on protesting his visit. Free Dominion is setting up welcoming demonstrations for President Bush to show him - and all Americans - that all Canadians are not Liberal weenies. Free Dominion has contacts in the U.S. Embassy, who know and trust us, and they are going to feed us information as to where...