New attack kit targets bag of ActiveX bugs

Monday, April 7th, 2008

Hackers are using a new multiple-attack package composed of seven ActiveX exploits, many of them never seen in the wild before, said a security company on Friday. Fewer than half of the flawed ActiveX controls have been patched. The attack framework probes Windows PCs for vulnerable ActiveX controls from software vendors Microsoft, ...

Password theft via vulnerability in Google code

Monday, April 7th, 2008

Billy Rios has discovered a vulnerability in the Google Code service which could be exploited to steal passwords from developers who have registered on the site. The Google Security Team has since fixed the vulnerability. Rios succeeded in gaining cross-domain access by uploading a crafted Java applet to a project on ...

Before Patch Tuesday, There Were Malware

Monday, April 7th, 2008

Recycling an old social engineering technique and using two different attack methods, a new spam run emerges as a threat to Web users before Microsoft’s Patch Tuesday. And not because it exploits soon-to-be named vulnerabilities. What this spamming operation takes advantage of is the anticipation itself for the release of patches ...

Storm Blogs

Monday, April 7th, 2008

Storm has once again turned its eye to the blogging community, specifically the Blogspot.com community. Several blogger sites with random or very quirky names have been sporting a love theme, Storm style. These sites appear to have been created solely for Storm's purposes and no legitimate blogger site has of yet ...

Top 15 Malicious Spyware Actions

Sunday, April 6th, 2008

Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses. Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...