Tuesday, August 16th, 2011
Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks the hosts “vk.com” and “vkontakte.ru” (both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way.Source:https://blogs.technet.com/b/mmpc/archive/2011/08/10/can-we-believe-our-eyes.aspx
Posted in Internet, Linux, Privacy, Security, Windows | No Comments
Wednesday, April 13th, 2011
We are today proude to announce the release of RawCap, which is a free raw sockets sniffer for Windows.
Here are some highlights of why RawCap is a great tool to have in your toolset:Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback)RawCap.exe is just 17 kBNo ...
Posted in Internet, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, April 12th, 2011
A new Trojan tries to extort money from users by convincing them to dial international telephone numbers to reactive Windows, a security researcher said today.
Once on a PC, the malware displays a message claiming that Windows is "locked" and must be reactivated, said Mikko Hypponen, the chief research officer of ...
Posted in Internet, Security, Windows | No Comments
Saturday, January 29th, 2011
Microsoft is investigating new public reports of a vulnerability in all supported editions of Microsoft Windows. The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting various Web sites, resulting in information disclosure. This impact is similar to server-side cross-site scripting (XSS) vulnerabilities. Microsoft ...
Posted in Internet, Privacy, Security, Windows | No Comments
Saturday, November 27th, 2010
Another 0-day bug on the Windows platform is affecting win32k.sys (a critical component of the Windows kernel), and this time, the approach seems to pose a major challenge to the security world. This vulnerability is triggered by a buffer overflow in the kernel file, which allows code to bypass UAC ...
Posted in Security, Windows | No Comments