DNSChanger 2.0

Sunday, December 21st, 2008

DNS Changer 2.0 (Trojan.Flush.M) is the next –in the wild- variant of this famous malware. Now the strategy has been changed, no need to modify the DNS settings on ADSL routers. Instead it will install a network driver (NDISProt.sys) which allows the malware to send/receive raw Ethernet packets. Such approach ...

Hackers find new crack in Windows

Saturday, December 20th, 2008

Microsoft Corp. rushed out an emergency patch Wednesday to fix a major security flaw in its Internet Explorer Web browser that has allowed hackers to infect millions of computers with viruses and steal personal information. So far, the vulnerability has not led to the widespread infections common a few years ago. ...

Google Chrome Puts Security in a Sandbox

Thursday, December 11th, 2008

The Google Chrome browser is no longer a beta, and has been outfitted with a coat of security armor Google hopes will both protect users and help Chrome compete with rival browsers. The toughest piece of that armor involves sandboxing. In Chrome, HTML rendering and JavaScript execution are isolated in their ...

Evolving DNS malware

Monday, December 8th, 2008

Symantec researchers have reported finding a variation on the old DNSChanger trojan that installs a rouge DHCP server simulation on local networks. This means that even uninfected machines on the network can get re-directed to malicious servers. DNSChanger has been present in the wild for some time and was originally designed ...

New trojan in mass DNS hijack

Saturday, December 6th, 2008

Researchers have identified a new trojan that can tamper with a wide array of devices on a local network, an exploit that sends them to impostor websites even if they are hardened machines that are fully patched or run non-Windows operating systems. The malware is a new variant of the DNSChanger, ...