Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

25 Most Dangerous Programming errors revealed

by Shanmuga

"The US National Security Agency has helped put together a list of the world’s most dangerous coding mistakes. The 25 entry list contains errors that can lead to security holes or vulnerable areas that can be targeted by cyber criminals.

Read the full article →

Serious bug opens major browsers to phishing attack

by Shanmuga

"Here’s how an attack would work: The bad guys would hack a legitimate website and plant HTML code that looks like a pop-up security alert window. The pop-up would then ask the victim to enter password and login information, and possibly answer other security questions used by the banks to verify the identity of their […]

Read the full article →

Tor anonymous network now has zero known bugs

by Shanmuga

"The developers of Tor the internet anonymisation system, have announced that thanks to a Coverity analysis, they have removed a number of bugs and vulnerabilities. Coverity perform source code analysis of C, C++ and Java and in September 2008, found 171 problems in the Tor code base. By December 2008, the Tor developers had got […]

Read the full article →

Russian Hacker leaves message for Microsoft in Trojan code

by Shanmuga

"Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

Read the full article →

Spyware Guard 2008 Fraud Unabated

by Shanmuga

Benjamin Googins a senior engineer working on CA’s Anti-Spyware product has blogged about the installation and operation of Spyware Guard 2008. "On a daily basis I see or hear about people (a lot of people) who are duped into buying fake security software that was installed on their PC. The distributors of this ‘rogue’ software […]

Read the full article →

UK ISPs to log all emails for 12 months

by Shanmuga

"New rules set to come into force in March will require all Internet Service Providers (ISPs) to keep information about every e-mail sent or received in the UK for a year. As the day grows closer so the opposition becomes more vocal.

Read the full article →

Google developer site being used to distribute malware

by Shanmuga

"Google’s free code-hosting Web site for developers is being used to distribute malware, a security researcher said on Friday. Google Code is a place where programmers can host projects and code.

Read the full article →

Spam: What to expect in 2009

by Shanmuga

"Spam, oh spam — can we ever get rid of you? 2008 saw a promising blow to the endless sea of junk mail, but the relief didn’t last for long. Now, spam experts say new forms of annoyances are on the way for the new year. "Some battles have been won in 2008, but the […]

Read the full article →

ZoneAlarm Pro FREE for one day

by Shanmuga

Check Point Software Technologies Ltd the company behind ZoneAlarm security solutions is likely to offer its product ZoneAlarm Pro security package for free with one year’s subscription. This offer is available for only 24 hours beginning 6 AM PDT on November 18, 2008.

Read the full article →

Rootkits: They’re sneaky, But are they a major threat?

by Shanmuga

"Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C. Used to infect Windows PCs and turn them into unwitting spam servers, Rustock.C is a rootkit that installs itself on the Windows operating system and then uses a variety of sophisticated techniques that make it nearly impossible to […]

Read the full article →

Microsoft’s Stance on Piracy Affects Us All

by Shanmuga

"As it stands today, Microsoft’s policy allows pirated copies to receive patches automatically through AutoUpdate, yet forbids them from downloading them directly from Microsoft’s Web site. Despite some tweaks to its policy, however, the company continues to make it difficult for users of pirated versions of its operating system to patch reliably.

Read the full article →

OSX.Lamzev.A – An OS X malware

by Shanmuga

A new trojan for the OS X has been discovered. When the Trojan is executed, it creates the following file: /Applications/ezmal

Read the full article →

Firefox 3.0.4 fixes several security issues

by Shanmuga

Mozilla today released Firefox 3.04 which addresses many several security issues among other bug fixes and exhancements. The update fixes the following critical issues:

Read the full article →

Microsoft explains seven-year-old patch delay

by Shanmuga

"Microsoft Corp. late yesterday explained why it had been unable to patch a seven-year-old bug until recently, saying that it was only in the last year that it figured out how to fix the flaw without breaking most network-based applications.

Read the full article →

Spam Drops After Internet Providers Disconnect a California Hosting Firm

by Shanmuga

"The servers are operated by McColo Corp., which these experts say has emerged as a major U.S. hosting service for international firms and syndicates that are involved in everything from the remote management of millions of compromised computers to the sale of counterfeit pharmaceuticals and designer goods, fake security products and child pornography via email.

Read the full article →

VirusTrigger Analysis and Removal

by Shanmuga

VirusTrigger is a new entrant to the ever growing family of rogue security software products. A clone of the rouge Antivirus Lab, the software and their Website is very professional in design and uses a variety of aggressive scare messages about non-existent malware infections.

Read the full article →

SURBL anti-spam blacklist to be a paid service

by Shanmuga

"The operator team of the SURBL anti-spam blacklist have announced a far-reaching change to the usage policy. While the use of the project’s DNS server has been free so far, the list’s operators are now demanding a usage fee from service providers that offer spam filter services for more than 1,000 mailboxes or 250,000 emails […]

Read the full article →

Anti-malware Testing Guidelines Published

by Shanmuga

"The Anti-Malware Testing Standards Organization has published a set of best practices and guiding principles for testing security software. Call it a much-needed first step.

Read the full article →

AVG antivirus update accidentally cripples Windows XP PCs

by Shanmuga

"According to messages on AVG’s support forums and its own support site, an update released late Saturday for the company’s security software fingered the "user32.dll" file as a Trojan horse. As per the program’s settings, the AVG software, including the newest version 8.0 and its predecessor 7.5, shut the .dll away in quarantine. The result: […]

Read the full article →

Microsoft Patches Four Windows Security Holes

by Shanmuga

"Microsoft today released a pair of security updates to plug at least four security holes in its Windows operating systems and other software. The software patches are available through Windows Update or via Automatic Updates.

Read the full article →

WinDefender 2009 Analysis and Removal

by Shanmuga

WinDefender 2009 is one of the recent rogue security software. A variant of the rogue IE Defender and Total Secure it deceptively looks similar to Windows Defender, a legitimate Microsoft anti-malware program. A rogue security software belongs to a family of software products that call themselves as antivirus, antispyware or registry cleaners and often use […]

Read the full article →

25 years of the computer virus

by Shanmuga

"A stressed e-mail from a friend once read: "A worm has just eaten my kid!" Thankfully, the message was not referring to infanticidal earthworms, but rather to a type of computer virus, a "worm", that had just infected some files (known as KID files) on his computer.

Read the full article →

How to Secure Laptops from Prying Eyes

by Shanmuga

"On April 21, 2008, the 9th U.S. Circuit Court of Appeals essentially gave the U.S. government carte blanche permission to check any and every piece of data on laptops belonging to travelers passing into the United States at border control checkpoints.

Read the full article →