Saturday, May 10th, 2008
Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products.
Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, May 8th, 2008
Microsoft's Vista operating system is more susceptible to malware than Windows 2000, and though it's 37% more secure than Windows XP, it's still too vulnerable.That's the contention of security vendor PC Tools, which has a financial interest in the vulnerability of Microsoft's software.
"Ironically, the new operating system has been hailed ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, May 8th, 2008
It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised.
And surprisingly, ...
Posted in Internet, Security | No Comments
Wednesday, May 7th, 2008
Mozilla warned Wednesday that a malicious program inserted adware code into a Firefox plugin that has been downloaded thousands of times over the past three months.
Because of a virus infection, the Vietnamese language pack for Firefox 2 was polluted with adware, Mozilla security chief Window Snyder said in a blog ...
Posted in Internet, Security | No Comments
Wednesday, May 7th, 2008
A loyal ISC reader, Rob, wrote in to point us at what looks to be a SQL Injection worm that is on the loose. From a quick google search it shows that there are about 4,000 websites infected and that this worm started at least mid-April if not earlier. Right ...
Posted in Coding, Internet, Privacy, Security | No Comments