Tuesday, June 3rd, 2008
For a while now I’ve been using different web browsers to compartmentalize my risk. Most of my primary browsing is in one browser, but I use another for potentially risky activities I want to isolate more. Running different browsers for different sessions isolates certain types of attacks. For example, unless ...
Posted in General BS, Internet, Linux, Privacy, Security, Software | No Comments
Tuesday, June 3rd, 2008
Trend Micro Monday announced a line of desktop and server security products intended for small to midsize businesses.
Worry-Free Business Security 5.0 represents a re-branding of Trend's SMB client/server messaging security product line plus upgrades that integrate features such as behavior-based antimalware monitoring and an option for in-the-cloud Web security services ...
Posted in Internet, Security, Software | No Comments
Monday, June 2nd, 2008
Yesterday's post discussed a mystery PDF file that was boopytrapped to drop a backdoor.
Today we'll look at how these documents are created.
Here's an example of a tool called Y08-04 aka GenMDB.
When run, it displays this user interface:
The apparent purpose of this tool is to create trojanized PDF files. You select ...
Posted in Coding, Internet, Security, Software | No Comments
Sunday, June 1st, 2008
Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes.
This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of ...
Posted in Coding, Internet, Linux, Privacy, Security, Software | No Comments
Friday, May 30th, 2008
Microsoft on Friday said it is investigating reports of "a blended threat that allows remote code execution on all supported versions of Windows XP and Windows Vista when Apple's Safari Web browser has been installed."An attacker could exploit the vulnerability by tricking a user into visiting a maliciously crafted Web ...
Posted in Internet, Security, Software, Windows | No Comments