Before Patch Tuesday, There Were Malware

Monday, April 7th, 2008

Recycling an old social engineering technique and using two different attack methods, a new spam run emerges as a threat to Web users before Microsoft’s Patch Tuesday. And not because it exploits soon-to-be named vulnerabilities. What this spamming operation takes advantage of is the anticipation itself for the release of patches ...

Storm Blogs

Monday, April 7th, 2008

Storm has once again turned its eye to the blogging community, specifically the Blogspot.com community. Several blogger sites with random or very quirky names have been sporting a love theme, Storm style. These sites appear to have been created solely for Storm's purposes and no legitimate blogger site has of yet ...

Top 15 Malicious Spyware Actions

Sunday, April 6th, 2008

Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses. Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...

FormFox

Sunday, April 6th, 2008

I've just recently caught wind of a Firefox plugin called FormFox.  Here's the description from the website: Do you know where your form information is going? This extension displays the form action (the site to which the information you've entered is being sent.) In any place where you can enter data, ...

MySQL SQL Injection Cheat Sheet

Sunday, April 6th, 2008

Some useful syntax reminders for SQL Injection into MySQL databases... This post is part of a series of SQL Injection Cheat Sheets.  In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend.  This helps to ...