Tuesday, March 10th, 2009
Merely storing -- without opening -- a malicious PDF file can trigger an attack that exploits the new, unpatched zero-day flaw in Adobe Reader, a researcher has discovered. Didier Stevens, a researcher and IT security consultant with Contrast Europe NV, today released a proof-of-concept demonstration that shows how a file ...
Posted in Coding, Internet, Security, Software | No Comments
Saturday, March 7th, 2009
Symantec’s ongoing monitoring of Downadup (a.k.a. Conficker) has today resulted in the observation of a completely new variant being pushed out to systems that are already infected with Downadup. After taking into account the hype surrounding some other recent reports of variants of Downadup, Symantec is calling this new variant ...
Posted in Internet, Privacy, Security | No Comments
Friday, March 6th, 2009
Twitter, the micro-blogging site, has closed an SMS spoofing security hole which, until Wednesday night, left accounts open to being hijacked. The vulnerability was due to an authentication weakness that allowed anyone who knew a user's mobile number to spoof their messages, provided that the user's mobile number was set ...
Posted in Internet, Privacy, Security | No Comments
Friday, March 6th, 2009
War-dialing is back, and it's not limited to finding modems anymore. Renowned researcher HD Moore is putting the final touches on his latest project -- a telephone auditing tool that also finds PBXes, dial tones, voicemail, faxes, and other phone line connections for security assessment, research, or inventory.
This is not ...
Posted in Internet, Privacy, Security | No Comments
Thursday, March 5th, 2009
It's malware that actually removes other malware from its victims' PCs. And so far, nobody is exactly sure how it's being distributed.
Security experts this week are buzzing about a new Trojan called Tigger.A, also known as Syzor. The data-stealing malware has quietly claimed about 250,000 victims since it was first ...
Posted in Internet, Privacy, Security, Windows | No Comments