Monday, December 8th, 2008
Symantec researchers have reported finding a variation on the old DNSChanger trojan that installs a rouge DHCP server simulation on local networks. This means that even uninfected machines on the network can get re-directed to malicious servers.
DNSChanger has been present in the wild for some time and was originally designed ...
Posted in Internet, Networking, Security | No Comments
Saturday, December 6th, 2008
Researchers have identified a new trojan that can tamper with a wide array of devices on a local network, an exploit that sends them to impostor websites even if they are hardened machines that are fully patched or run non-Windows operating systems.
The malware is a new variant of the DNSChanger, ...
Posted in Internet, Networking, Privacy, Security | No Comments
Thursday, October 2nd, 2008
Even routinely clean antivirus scans can’t hide the dirty little secret more enterprises are facing today: Some of their client machines are members of botnets.
That’s why Matt Sergeant, senior anti-spam technologist for MessageLabs Ltd. , hopes to educate some large organizations and ISPs on how to detect and clean up ...
Posted in Internet, Networking, Privacy, Security | No Comments
Friday, August 29th, 2008
ISR-evilgrade is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates and exploiting the system or software.
How does it work?
It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of ...
Posted in Internet, Networking, Privacy, Security, Software | No Comments
Tuesday, August 26th, 2008
Researchers at Carnegie Mellon University have released an extension for Firefox 3 that can protect wireless network users from so-called "man-in-the-middle" attacks.
The software, dubbed "Perspectives," is available for download for free.
Perspectives also protects against attacks that exploit a recently exposed flaw in the DNS system, which translates Web addresses into ...
Posted in Internet, Networking, Privacy, Security | No Comments
Page 6 of 14« First«...45678...»Last »