Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Malware: Malware spreads in nanoseconds

by Shanmuga

"The malware threat landscape is changing rapidly and it spells tremendous opportunities for McAfee Inc, the leading antivirus and computer security firm. India is likely to play a great role to help the company meet its challenges, McAfee president and CEO David DeWalt on his first visit to India after assuming office at the Santa […]

Read the full article →

Privacy: Facebook faces privacy questions

by Shanmuga

"Facebook is to be quizzed about its data protection policies by the Information Commissioner’s Office. The investigation follows a complaint by a user of the social network who was unable to fully delete their profile even after terminating their account. Currently, personal information remains on Facebook’s servers even after a user deactivates an account.

Read the full article →

Tips: How to Minimize Risk from Zero Day Attacks

by Shanmuga

"…Microsoft Excel files are being used to exploit a zero-day (previously unknown/unpatched) vulnerability and plant keystroke loggers on select (.gov?) networks…bugs in Microsoft Office applications emerged over the last year as standard weapons for criminals conducting corporate espionage and computer attacks against military targets. Last summer, Microsoft’s Office team struggled to keep pace with flaw […]

Read the full article →

Credit card data breach could affect 650,000

by Shanmuga

"Personal information on about 650,000 customers of J.C. Penney and up to 100 other retailers could be compromised after a computer tape went missing. GE Money, which handles credit card operations for Penney and many other retailers, said Thursday night that the missing information includes Social Security numbers for about 150,000 people.

Read the full article →

Privacy: Microsoft Wants to Be Your Big Brother

by Shanmuga

"It’s not science-fiction. It’s a real technology and it cannot be allowed to happen or privacy will vanish. In Microsoft’s vision of tomorrow’s office, according to a report in the London Times, our computers will be constantly monitoring us with wireless sensors. There’s nothing new about Big Brother software. Programs that measure how many keystrokes […]

Read the full article →

Hacking: Researcher cracks Yahoo CAPTCHA software

by Shanmuga

"A security researcher has claimed that Yahoo’s system for blocking automated access to its systems – the CAPTCHA image-recognition system – has been effectively cracked. CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) systems are used by Yahoo, as well as Google, Microsoft and others, to stop automated systems from registering […]

Read the full article →

Hacking: Hackers go after Excel

by Shanmuga

"Microsoft has warned that an unpatched vulnerability in older versions of Excel is being actively exploited by hackers. The bug, which has become the subject of targeted attacks, affects older versions of Excel. Newer versions Excel 2003 SP3 and Excel 2007 are said to be immune. Details of the vulnerability beyond what packages might be […]

Read the full article →

Hacking: Hackers Have Attacked Foreign Utilities, CIA Analyst Says

by Shanmuga

"In a rare public warning to the power and utility industry, a CIA analyst this week said cyber attackers have hacked into the computer systems of utility companies outside the United States and made demands, in at least one case causing a power outage that affected multiple cities.

Read the full article →

Security: Top 10 Cybersecurity Menaces For 2008

by Shanmuga

"The SANS Institute on last Monday released its take on the top 10 cybersecurity threats for 2008. Leading the list is a rise in the number of attacks on Web browsers, the proliferation of botnets, and sophisticated cyberespionage. Twelve noted cybersecurity experts — Stephen Northcutt, Ed Skoudis, Marc Sachs, Johannes Ullrich, Tom Liston, Eric Cole, […]

Read the full article →

Malicious Code: Trojan.Silentbanker

by Shanmuga

"The scale and sophistication of this emerging banking Trojan is worrying, even for someone who sees banking Trojans on a daily basis. This Trojan downloads a configuration file that contains the domain names of over 400 banks. Not only are the usual large American banks targeted but banks in many other countries are also targeted, […]

Read the full article →

Malware: Fight Malware With Exposure, Group Advises

by Shanmuga

"One of the best ways to fight the criminal malware networks that now populate the Internet might actually be the simplest – publicize their existence. That is one conclusion that to be drawn from a white paper published by a volunteer group, the Shadowserver Foundation, which assesses the activities of the Russian Business Network (RBN), […]

Read the full article →

Hacking: Legitimate sites serving up stealthy attacks

by Shanmuga

"Thousands of legitimate Web sites are hosting an infection kit that evades detection by attempting to compromise each visitor only once and using a different file name each time, Web security firm Finjan warned last Monday. The attack, dubbed the "Random JS toolkit" by the security firm, currently uses dozens of hosting servers and more […]

Read the full article →

Malware: The malware shadow economy

by Shanmuga

"Viruses, malware and online crime are evolving from the realm of geeks into a major shadow economy that closely mimics the real world. Maksym Schipka, a senior architect at security firm MessageLabs, claims to have identified a sophisticated online black market with tens of thousands of participants. This underground internet economy is worth over $105bn, […]

Read the full article →

Spam: Five Things You Should Know About Fighting Spam

by Shanmuga

…"85 percent or more of all e-mail traffic today is spam. If you haven’t been listening closely to the dark mutterings in your e-mail administrator’s office, you may have missed out on significant clues about the nature of the problem and what the IT department can do to address it. However, when you do listen […]

Read the full article →

Malware: An Inside Look at the Russian Business Network

by Shanmuga

"A new white paper published by the nonprofit botnet-tracker Shadowserver Foundation sheds some light on one segment of activity on the Russian Business Network (RBN). Shadowserver released its findings on malware associated with the so-called AS40989 group of interconnected IP networks on the RBN.

Read the full article →

Malware: Warning on stealthy Windows virus

by Shanmuga

"Security experts are warning about a stealthy Windows virus that steals login details for online bank accounts. In the last month, the malicious program has racked up about 5,000 victims – most of whom are in Europe. Many are falling victim via booby-trapped websites that use vulnerabilities in Microsoft’s browser to install the attack code.

Read the full article →

Vulnerabilities: First QuickTime bug of 2008

by Shanmuga

"Luigi Auriemma, a 27-year-old Italian researcher who broke the news of the flaw on Thursday, said that the most recent version of QuickTime is prone to a buffer overflow that, if successfully exploited, gives the attacker free rein over a user’s computer. He posted information and proof-of-concept code on security site, milw0rm, his own website […]

Read the full article →

Hacking: Hijacking Printers For Spamming

by Shanmuga

"Building on the concept of cross-site scripting, whereby an attacker can inject malicious code in Web pages viewed by others, security researcher Aaron Weaver has demonstrated how an attacker can inject spam messages into a Web site visitor’s printer.

Read the full article →

Vulnerabilities: Microsoft Flaw could lead to worm attack

by Shanmuga

"Microsoft has fixed a critical flaw in the Windows operating system that could be used by criminals to create a self-copying computer worm attack. The software vendor released its first set of patches for 2008 on Tuesday, fixing a pair of networking flaws in the Windows kernel. Microsoft also released a second update for a […]

Read the full article →

Malware: A Wi-Fi virus outbreak? Researchers say it is possible

by Shanmuga

"If criminals were to target unsecured wireless routers, they could create an attack that could piggyback across thousands of Wi-Fi networks in urban areas like Chicago or New York City, according to researchers at Indiana University. The researchers estimate that a Wi-Fi attack could take over 20 000 wireless routers in New York City within […]

Read the full article →

Hacking: Security Software Vendor Web Site Hacked by Malware Authors

by Shanmuga

"Part of security software vendor CA’s Web site was hacked earlier this week and was redirecting visitors to a malicious Web site hosted in China.

Read the full article →

Security: What’s In Store for 2008?

by Shanmuga

"Microsoft predicts that in 2008 criminals will continue to use social engineering tactics in fresh and devious ways. Social engineering refers to the tactics criminals use to manipulate people into taking action online that enables criminals to steal their money or personal information.

Read the full article →

Vulnerabilities: RealPlayer flaw raises security flags

by Shanmuga

"Security experts are warning users to be vigilant after the disclosure of a new security vulnerability in RealPlayer. The flaw could allow an attacker to remotely execute code on a victim’s machine.

Read the full article →