Monday, April 7th, 2008
Hackers are using a new multiple-attack package composed of seven ActiveX exploits, many of them never seen in the wild before, said a security company on Friday.
Fewer than half of the flawed ActiveX controls have been patched.
The attack framework probes Windows PCs for vulnerable ActiveX controls from software vendors Microsoft, ...
Posted in Internet, Security, Windows | No Comments
Monday, April 7th, 2008
Billy Rios has discovered a vulnerability in the Google Code service which could be exploited to steal passwords from developers who have registered on the site. The Google Security Team has since fixed the vulnerability.
Rios succeeded in gaining cross-domain access by uploading a crafted Java applet to a project on ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Monday, April 7th, 2008
Recycling an old social engineering technique and using two different attack methods, a new spam run emerges as a threat to Web users before Microsoft’s Patch Tuesday. And not because it exploits soon-to-be named vulnerabilities.
What this spamming operation takes advantage of is the anticipation itself for the release of patches ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments
Monday, April 7th, 2008
Storm has once again turned its eye to the blogging community, specifically the Blogspot.com community.
Several blogger sites with random or very quirky names have been sporting a love theme, Storm style. These sites appear to have been created solely for Storm's purposes and no legitimate blogger site has of yet ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses.
Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...
Posted in Coding, Internet, Privacy, Security | No Comments