Tuesday, March 17th, 2009
Windows has, for many years, come with a special mode you can load at boot called Safe Mode. The idea is that non-essential services and software don't load in safe mode and so it can be useful in diagnosing system problems.
You might assume that it can be useful in fixing ...
Posted in Security, Windows | No Comments
Tuesday, March 17th, 2009
One of the patches Microsoft issued last week is nothing of the sort, according to a researcher who has accused Microsoft of making functionality a higher priority than security.
According to Tyler Reguly, a senior security engineer with nCircle Security, last Tuesday's MS09-008 update does not fix the problem for all ...
Posted in Security, Windows | No Comments
Wednesday, March 11th, 2009
Websense Security Labs ThreatSeeker Network has received reports of spoofed Facebook email messages that contain malicious links. The messages look similar to legitimate Facebook messages and invite recipients to click on the link contained in the message to view a video.
Message subjects seen have been:
FaceBook message: Dancing Girl Drunk In ...
Posted in Internet, Security, Windows | 2 Comments
Wednesday, March 11th, 2009
Win32/Koobface is a worm that may spread when a user logs into their profile account on the Internet social network sites MySpace, Facebook and others. The following system changes may indicate the presence of this malware:
Addition of the following files:
%windir%\bolivar19.exe
%windir%\bolivar31.exe
%windir%\bolivar30.exe
%windir%\ld01.exe
%windir%\che08.exe
%windir%\freddy35.exe
And/or the getting the following message box:
March's edition of the Malicious Software Removal ...
Posted in Internet, Privacy, Security, Windows | No Comments
Tuesday, March 10th, 2009
Adobe released a patch today for a zero-day vulnerability under attack by hackers.
The patch, available for version 9 of Adobe Reader and Adobe Acrobat, comes a day earlier than the company’s planned release. Patches for earlier versions of the product are still slated for March 18.
The vulnerability is the result ...
Posted in Coding, Internet, Security | No Comments