Saturday, March 8th, 2008
http://www.securityfocus.com/infocus/1780
1. Introduction
The threat of malicious software can easily be considered as the greatest threat to Internet security. Earlier, viruses were, more or less, the only form of malware. Nowadays, the threat has grown to include network-aware worms, trojans, DDoS agents, IRC Controlled bots, spyware, and so on. The infection vectors ...
Posted in Security | No Comments
Saturday, March 8th, 2008
Microsoft warned Friday that customers face security risks if they use some of its aging operating systems after it ends support for them in July.
The systems affected are Windows 98, Windows 98 Second Edition, and Windows Millennium Edition. Support will end on July 11, the next date for Microsoft's monthly ...
Posted in Security, Windows | No Comments
Saturday, March 8th, 2008
Which operating system, embedded in more than 80% of enterprise IT environments, represents one of the fastest-growing hacker targets and potentially the most-devastating information-security vulnerability? Hint: It ain't Windows. Cisco Systems' Internetwork Operating System now sits at the center of the information security vortex. Because IOS controls the routers that ...
Posted in Hardware, Security | No Comments
Saturday, March 8th, 2008
Exploit code was published on Friday for a Windows flaw similar to the vulnerability that led to the Zotob worm that wreaked havoc in August.
The code takes advantage of a bug related to plug-and-play technology in Windows 2000 and Windows XP. Microsoft provided a patch for the flaw on 11 ...
Posted in Security, Windows | No Comments
Saturday, March 8th, 2008
Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device, according to an executive from SPI Dynamics, which discovered the security hole. The buffer-overflow vulnerabilities could enable an attacker to circumvent Windows security and gain administrative ...
Posted in Security, Windows | No Comments