Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $29,485
36%  
Woo hoo!! And we're now over 36%!! Thank you all very much!! God bless.

Keyword: securityflaw

Brevity: Headers | « Text »
  • Microsoft warns of unpatched IE flaw

    07/01/2005 10:53:43 AM PDT · by Redcloak · 150 replies · 2,347+ views
    ZDNet ^ | July 1, 2005, 8:55 AM PT | Dawn Kawamoto
    Microsoft warns of unpatched IE flaw By Dawn Kawamoto, CNET News.com Published on ZDNet News: July 1, 2005, 8:55 AM PT Microsoft has issued a security advisory for Internet Explorer, after a research firm published a working exploit to demonstrate how attackers could take advantage of the flaw. The vulnerability, discovered by SEC Consult, mean that attackers could cause the browser to unexpectedly exit and execute arbitrary code. Versions of IE affected by the flaw include IE 6.0 on Windows 2000 with Service Pack 1, 3 and 4, and on Windows XP with Service Pack 1 and 2. "Microsoft is investigating...
  • Is Big Brother logging your keystrokes?

    06/21/2005 4:36:58 AM PDT · by Budgie · 79 replies · 2,232+ views
    <p>I was opening up my almost brand new Dell 600m laptop, to replace a broken PCMCIA slot riser on the motherboard. As soon as I got the keyboard off, I noticed a small cable running from the keyboard connection underneath a piece of metal protecting the motherboard.</p>
  • Security Breach Could Expose 40M to Fraud -No these aren't the files Hillary stole

    06/17/2005 3:29:57 PM PDT · by Tumbleweed_Connection · 8 replies · 555+ views
    AP ^ | 6/17/05 | JOE BEL BRUNO
    A security breach of customer information at a credit card-processing company could expose to fraud up to 40 million cardholders of multiple brands, MasterCard International Inc. said Friday. The credit card giant said its security division detected multiple instances of fraud that tracked back to CardSystems Solutions Inc. of Tucson, Ariz., which processes transactions for banks and merchants. MasterCard said in a news release late Friday afternoon that it was notifying its card-issuing banks of the problem. CardSystems was hit by a computer virus that captured customer data for the purpose of fraud, said company spokeswoman Sharon Gamsin. The FBI...
  • Security breach could expose 40M to fraud (40 million credit cards captured by computer virus)

    06/17/2005 4:13:09 PM PDT · by HAL9000 · 97 replies · 3,059+ views
    Associated Press | June 18, 2005 | JOE BEL BRUNO
    NEW YORK - A security breach of customer information at a credit card-processing company could expose to fraud up to 40 million cardholders of multiple brands, MasterCard International Inc. said Friday. The credit card giant said its security division detected multiple instances of fraud that tracked back to CardSystems Solutions Inc. of Tucson, Ariz., which processes transactions for banks and merchants. MasterCard said in a news release late Friday afternoon that it was notifying its card-issuing banks of the problem. CardSystems was hit by a computer virus that captured customer data for the purpose of fraud, said company spokeswoman Sharon...
  • Jackson Suicide Trojan Surfaces

    06/10/2005 7:37:26 AM PDT · by COUNTrecount · 14 replies · 803+ views
    Techtree.com ^ | June 10, 2005
    Jun 10, 2005 Experts at SophosLabs, Sophos's global network of virus and spam analysis centers, have warned of a spam campaign that claims that Michael Jackson has attempted suicide in an attempt to lure innocent computer users into being infected by a Trojan horse. The email claims that Michael Jackson has attempted to commit suicide. But clicking on the link will cause infection. Sophos has identified hundreds of the spam messages being sent, preying on intense media interest in the trial of the controversial popstar. The spam emails have the following characteristics: Subject: Re: Suicidal aattempt Message text: Last night,...
  • Can You Trust Your Spyware Protection?

    05/31/2005 6:41:03 PM PDT · by El Conservador · 92 replies · 2,735+ views
    PCWorld.com through Yahoo! News ^ | May 31, 2005 | Andrew Brandt
    The next time you run a scan with your anti-spyware tool, it might miss some programs. Several anti-spyware firms, including Aluria, Lavasoft, and PestPatrol, have quietly stopped detecting adware from companies like Claria and WhenU--a process called delisting. Those adware companies have been petitioning anti-spyware firms to delist their software; other companies have resorted to sending cease-and-desist letters that threaten legal action. In most cases it's difficult for customers to determine whether their anti-spyware tool has delisted anything and, if so, which adware it skips. "When a spyware program gets delisted, users won't be aware of its presence," says Harvard...
  • Deleting spyware: a criminal act?

    05/25/2005 12:39:09 PM PDT · by ShadowAce · 65 replies · 2,591+ views
    The Register ^ | 25 May 2005 | Mark Rasch
    Analysis On my computer right now I have three anti-spyware programs, three anti-virus programs, and three anti-spam programs, together with a hardware and software firewall, an IPsec VPN, and data level encryption on certain files (and no, this is not intended to be an invitation for you to try to test my security.) The anti-spyware, anti-virus, and anti-spam software all work in very much the same way - they have definitions of known malicious programs, and they may also have algorithms to raise flags about unknown programs which operate in an unusual way. Depending upon user preferences, the programs either...
  • Microsoft security guru: Jot down your passwords

    05/24/2005 5:59:30 PM PDT · by Panerai · 58 replies · 1,425+ views
    ZDNet News ^ | May 23, 2005 | Munir Kotadia
    Companies should not ban employees from writing down their passwords because such bans force people to use the same weak term on many systems, according to a Microsoft security guru. Speaking on the opening day of a conference hosted by Australia's national Computer Emergency Response Team, or AusCERT, Microsoft's Jesper Johansson said that the security industry has been giving out the wrong advice to users by telling them not to write down their passwords. Johansson is senior program manager for security policy at Microsoft. "How many have (a) password policy that says under penalty of death you shall not write...
  • Microsoft Readies Its Antivirus App

    05/13/2005 7:41:11 AM PDT · by Mike Bates · 62 replies · 976+ views
    Yahoo News/ IGDG News Service ^ | 5/13/2005 | oris Evers
    Microsoft is readying a new consumer security product that offers virus and spyware protection, a new firewall and several tune-up tools for Windows PCs, a move that pits the software giant squarely against traditional security software vendors. The product, dubbed Windows OneCare, will be tested internally at Microsoft starting this week. A public test, or beta, version is scheduled to be available by year's end, Microsoft said in a statement this week. The final product will be offered as a subscription service, the Redmond, Washington, software maker says. OneCare marks Microsoft's long-anticipated entry into the antivirus space, until now the...
  • DRUDGE: Feds Investigate Huge Computer Attack; Worldwide Hunt for 'Stakkato'

    05/09/2005 6:11:18 PM PDT · by West Coast Conservative · 47 replies · 3,513+ views
    Drudge Report ^ | May 9, 2005 | Matt Drudge
    1000s of computer systems serving U.S. military, NASA, prominent research labs have been penetrated by 'single intruder or a small band, apparently based in Europe'... MORE... Spokeswoman for White Sands Missile Range in New Mexico confirmed there has been 'unauthorized access'... Developing...
  • New VIRUS threat Sober.p (4% of emails contain .zip files-DO NOT OPEN!)

    05/04/2005 5:16:08 PM PDT · by Las Vegas Dave · 95 replies · 2,740+ views
    Virus Name Risk Assessment W32/Sober.p@MM Corporate User : Low-Profiled Home User : Medium Virus Information Discovery Date: 05/02/2005 Origin: Unknown Length: 53,727 bytes (zip) 53,554 bytes (executable) Type: Virus SubType: E-mail Minimum DAT: 4443 (03/09/2005) Updated DAT: 4482 (05/02/2005) Minimum Engine: 4.3.20 Description Added: 05/02/2005 Description Modified: 05/02/2005 3:59 PM (PT) Description Menu Virus Characteristics Symptoms Method Of Infection Removal Instructions Variants / Aliases Rate This page Print This Page Email This Page Legend Virus Characteristics: -- Update 2nd May 13:00 PST -- Due to increased prevalence, this threat has had its risk assessment raised to MEDIUM for Home Users....
  • Sober worm makes a comeback

    04/19/2005 1:52:01 PM PDT · by infocats · 24 replies · 1,116+ views
    ZD Net News ^ | April 19, 2005 | Dan Ilett
    Virus writers have resurrected the Sober worm with a new variant that is spreading quickly over the Internet. Security experts said Tuesday that the worm, dubbed Sober.M, reports e-mail addresses of victims back to its anonymous author--a technique known as harvesting. Spammers typically buy these fresh addresses to add to their lists of e-mail recipients. The e-mail containing the worm is written in bad English with the subject line: "I've got your e-mail on my account." "It looks like the virus writer is deliberately using broken English to (convince) people the e-mail is not a virus," Graham Cluley, senior technology...
  • Alternative browser spyware infects IE

    03/11/2005 10:56:57 AM PST · by ShadowAce · 77 replies · 2,280+ views
    Register ^ | 11 March 2005 | John Leyden
    Some useful citizen has created an installer that will nail IE with spyware, even if a surfer is using Firefox (or another alternative browser) or has blocked access to the malicious site in IE beforehand. The technique allows a raft of spyware to be served up to Windows users in spite of any security measures that might be in place. Christopher Boyd, a security researchers at Vitalsecurity.org, said the malware installer was capable of working on a range of browsers with native Java support. "The spyware installer is a Java applet powered by the Sun Java Runtime Environment, which allows...
  • New IM Worms Hit MSN Messenger

    03/07/2005 3:27:17 PM PST · by RebelTex · 75 replies · 2,080+ views
    TechWeb News ^ | March 07, 2005 | Gregg Keizer
    New worms spreading through MSN Messenger -- and its bundled-with-Windows Windows Messenger version -- via links to a malicious site are infecting users and leaving their PCs open to hacker hijack, security vendors reported Monday. The new worms, tagged as Kelvir.a and Kelvir.b, appeared over the weekend and on Monday, respectively, anti-virus vendors said. Both use the same mechanism to attract users and infect Windows-based PCs: they include a link in the instant message. That link, in turn, downloads a malicious file -- the actual worm, a variant of the long-running Spybot -- which opens a backdoor to the compromised...
  • Microsoft Internet Explorer MSHTML.DLL CSS Handling Remote Buffer Overflow Vulnerability

    03/09/2005 10:48:17 AM PST · by B Knotts · 30 replies · 1,147+ views
    SecurityFocus ^ | 3/9/2005
    Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself when the application handles a malformed CSS file. A typical attack would involve the attacker creating a Web site that includes the malicious CSS file. The attacker may then entice a vulnerable user to visit the site. If successful, this attack may result in granting the attacker unauthorized access to the affected computer in the context of the user running Internet Explorer.
  • Worm.Win32.Sober.L Alert!(Save your Computer Data)

    03/09/2005 6:19:11 AM PST · by OPS4 · 34 replies · 2,335+ views
    Emmissoft | Wed. March 9 2005 | a-squared
    Important information about current security risks. Worm.Win32.Sober.L Alert! A new variant of the Sober worm is spreading fast. As it's predecessors, Sober.L spreads as an email attachment in emails which are sent to all email addresses found on the victim's harddisk. Even if the executable file is packed in a .ZIP file, many users open the file and activate the worm this way. For novice users it's hard to see that it is a worm generated email because the email subject is "your password + accountnumber !". The email body text is the following: hi, i've got an admin mail...
  • Bagle Trojan Attack Strikes, Multiple Versions Overwhelm AV Defenses

    03/01/2005 12:36:33 PM PST · by Eagle9 · 23 replies · 1,096+ views
    TechWeb ^ | March 01, 2005 | Gregg Keizer
    A major wave of Bagle-like Trojan horses hit users worldwide Tuesday with numerous variations that aim to overwhelm anti-virus defenses by morphing faster than research labs can release new signatures. The attack, which began about midnight EST, was launched in a large-scale spamming campaign, said virus researchers, and although the new threat doesn't spread on its own -- these are Trojans with Bagle characteristics, not true worms -- many security vendors have bumped up warnings to get out the word. It's unclear how many variations are at loose. Some vendors, such as Symantec, had reported only two as of mid-morning...
  • Windows worm weaves its way with search engines

    02/17/2005 3:06:25 PM PST · by TomServo · 35 replies · 1,470+ views
    Silicon Valley/San Jose Business Journal ^ | 2/17.05 | American City Business Journals Inc.
    Windows worm weaves its way with search engines A new worm that uses Internet search engines to spread rapidly was detected Thursday, according to antivirus software maker Panda Software, a private company based in Bilbao, Spain, which operates in the U.S. as PandaLabs of Glendale, in Southern California. Called "MydoomAO," the worm uses Mountain View-based Google (NASDAQ: GOOG), Altavista, Sunnyvale-based Yahoo (NASDAQ: YHOO) and Lycos to search for e-mail addresses to which to send itself. In order to trick users, the worm pretends to be a mail delivery error message. In this way, a single infected computer can distribute thousands...
  • Hackers Quickly Target Newly Disclosed Microsoft Flaw

    02/10/2005 7:31:00 PM PST · by Eagle9 · 27 replies · 899+ views
    TechWeb - InternetWeek.com ^ | February 10, 2005 | Gregg Keizer
    It didn't take hackers long to start banging hard on the vulnerabilities Microsoft disseminated Tuesday. Just a day after the Redmond, Wash.-based developer rolled out a dozen advisoriescontaining 16 vulnerabilities, 10 of them tagged as "Critical," exploit code has gone public for one, Microsoft said late Wednesday. "Microsoft won't be happy that someone has posted information about how to take advantage of their critical security hole within 48 hours of their patch being released," said Graham Cluley, senior technology consultant for Sophos, in a statement. "Many computer users are bound to have not yet defended themselves," he added. Microsoft posted...
  • Microsoft's Security Chief Says Windows Safer Than Linux

    02/10/2005 7:40:34 PM PST · by Eagle9 · 69 replies · 1,128+ views
    TechWeb ^ | February 10, 2005 | Gregg Keizer
    Microsoft's top security honcho insisted Thursday that Microsoft "is making progress on security using any reasonable metric." Mike Nash, the company's chief security executive, made the comment during an online chat session just days after Microsoft rolled out its biggest bunch of Windows patches since April 2004. Nash staunchly defended the Redmond, Wash.-based developer's progress, and compared Windows' flaws with those in open-source Linux operating systems from Red Hat and Novell's SuSE. "Even with the relatively large number of bulletins we released this week, we compare favorably," he said. "Year-to-date for 2005, Microsoft has fixed 15 vulnerabilities affecting Windows Server...