Tuesday, February 24th, 2009
Symantec is reporting that Trojan.Mdropper.AC is exploiting an unpatched vulnerability in Excel 2007. Earlier versions of Excel may also be vulnerable.
The vulnerability is described as a "Boundary Condition Error" and can result in remote code execution, but that's it for details for now. The research is obviously in its early ...
Posted in Coding, Security, Software, Windows | No Comments
Monday, February 23rd, 2009
It seems that the authors of the Conficker worm for Windows are continually updating their malware. In their current analyses, researchers at SRI International have found that the current Conficker variants B and B++ are decidedly more flexible than their predecessors in downloading further components and new versions.
The first version ...
Posted in Internet, Privacy, Security | No Comments
Monday, February 23rd, 2009
A Trojan horse lurking on servers belonging to Auctiva.com, a Web site offering eBay auction tools, infected people's PCs last week.
The problem became very public when Google's malware warning system kicked in as people tried to browse the site, saying Auctiva was infected with malware. Google will display an interstitial ...
Posted in Coding, Internet, Security, Software | No Comments
Saturday, February 21st, 2009
A researcher has found a convincing way to hack the SSL protocol used to secure logins to a range of Web sites, including e-commerce and banking sites.
Using a specially-created app, 'SSLstrip', a researcher calling himself Moxie Marlinspike demonstrated to Black Hat Arlington, Va attendees, how vulnerable many SSL connections were ...
Posted in Internet, Privacy, Security | No Comments
Saturday, February 21st, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Networking, Privacy, Security, Software | 1 Comment