Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Recommended Reads

Latest Conficker worm gets nastier

by Shanmuga

"The authors of the latest variant of the Conficker worm are upping the ante against security vendors who are working to stop the spread and threat of the persistent program. Conficker.C shuts down security services, blocks computers from connecting to security Web sites, and downloads a Trojan.

Read the full article →

BBC team buys a botnet, DDoSes security company Prevx

by Shanmuga

"In a bit of an awkward and highly unnecessary move, a team at the BBC’s technology program Click has purchased a botnet consisting of 22,000 malware infected PCs, self-spammed themselves on a Gmail account, and later on DDoS-ed a a backup site owned by security company Prevx (with prior agreement), all for the sake of […]

Read the full article →

Hackers continue to abuse search engine results

by Shanmuga

"Cyber-criminals are always on the lookout for new tricks, but they are also sticking with an oldie-but-goodie—abusing search engine results. According to security pros, there has been a significant increase in the tactic since January. On March 10, officials at Symantec noted attackers were using sponsored search results on Yahoo to lure Web surfers to […]

Read the full article →

25 Most Dangerous Programming errors revealed

by Shanmuga

"The US National Security Agency has helped put together a list of the world’s most dangerous coding mistakes. The 25 entry list contains errors that can lead to security holes or vulnerable areas that can be targeted by cyber criminals.

Read the full article →

Serious bug opens major browsers to phishing attack

by Shanmuga

"Here’s how an attack would work: The bad guys would hack a legitimate website and plant HTML code that looks like a pop-up security alert window. The pop-up would then ask the victim to enter password and login information, and possibly answer other security questions used by the banks to verify the identity of their […]

Read the full article →

Tor anonymous network now has zero known bugs

by Shanmuga

"The developers of Tor the internet anonymisation system, have announced that thanks to a Coverity analysis, they have removed a number of bugs and vulnerabilities. Coverity perform source code analysis of C, C++ and Java and in September 2008, found 171 problems in the Tor code base. By December 2008, the Tor developers had got […]

Read the full article →

Russian Hacker leaves message for Microsoft in Trojan code

by Shanmuga

"Here’s a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.

Read the full article →

Spyware Guard 2008 Fraud Unabated

by Shanmuga

Benjamin Googins a senior engineer working on CA’s Anti-Spyware product has blogged about the installation and operation of Spyware Guard 2008. "On a daily basis I see or hear about people (a lot of people) who are duped into buying fake security software that was installed on their PC. The distributors of this ‘rogue’ software […]

Read the full article →

Google developer site being used to distribute malware

by Shanmuga

"Google’s free code-hosting Web site for developers is being used to distribute malware, a security researcher said on Friday. Google Code is a place where programmers can host projects and code.

Read the full article →

Spam: What to expect in 2009

by Shanmuga

"Spam, oh spam — can we ever get rid of you? 2008 saw a promising blow to the endless sea of junk mail, but the relief didn’t last for long. Now, spam experts say new forms of annoyances are on the way for the new year. "Some battles have been won in 2008, but the […]

Read the full article →

Rootkits: They’re sneaky, But are they a major threat?

by Shanmuga

"Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C. Used to infect Windows PCs and turn them into unwitting spam servers, Rustock.C is a rootkit that installs itself on the Windows operating system and then uses a variety of sophisticated techniques that make it nearly impossible to […]

Read the full article →

Microsoft’s Stance on Piracy Affects Us All

by Shanmuga

"As it stands today, Microsoft’s policy allows pirated copies to receive patches automatically through AutoUpdate, yet forbids them from downloading them directly from Microsoft’s Web site. Despite some tweaks to its policy, however, the company continues to make it difficult for users of pirated versions of its operating system to patch reliably.

Read the full article →

25 years of the computer virus

by Shanmuga

"A stressed e-mail from a friend once read: "A worm has just eaten my kid!" Thankfully, the message was not referring to infanticidal earthworms, but rather to a type of computer virus, a "worm", that had just infected some files (known as KID files) on his computer.

Read the full article →

US-CERT: Using Caution with USB Drives

by Shanmuga

"Because USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and extremely portable, they are popular for storing and transporting files from one computer to another. However, these same characteristics make them appealing to attackers.

Read the full article →

Malware Detection Goes Hybrid

by Shanmuga

"What do we do about malware? The long term solution, at least for managed networks like enterprises, may be whitelisting. But in the meantime we’re still drowning in new variants every day. In the 2009 generation of their products Symantec is trying a new approach: file reputation.

Read the full article →

New Malware Family Took Off in October

by Shanmuga

"According to Sunbelt Software’s monthly listing of the most ubiquitous malware and spyware attacks, an entirely new family of threats emerged rapidly during October.

Read the full article →

Researchers Hijack Storm Worm to Track Profits

by Shanmuga

"A single response from 12 million e-mails is all it takes for spammers to turn annual profits of millions of dollars promoting knockoff pharmaceuticals, according to an unprecedented new study on the economics of spam.

Read the full article →

Firefox 3.1 passes major milestone

by Shanmuga

"Mozilla has completed work on its private browsing mode, the feature the organisation delayed the launch of 3.1 to implement. Private browsing mode allows users to surf the web without leaving any traces of their session on the computer. The company was initially reluctant to include the feature, putting it on hold for four years.

Read the full article →

Adobe patches 8 bugs in popular PDF apps

by Shanmuga

"Adobe Systems Inc. patched its Reader application for the fifth time this year, plugging eight security holes, including one that was reported to the company more than five months ago.

Read the full article →

Firefox hits record market share

by Shanmuga

"Firefox has been playing with the 20% market share mark for some time now. Back in July we reported that the browser has begun jumping over 20% on several days and this trend has solidified since then. In October, Firefox’ average market share as measured by Net Applications was 19.97%, up 0.51 points from 19.46% […]

Read the full article →

Bots exploiting Microsoft’s latest RPC flaw

by Shanmuga

"Several antivirus vendors are reporting on Monday a new round of exploitation of Microsoft’s out-of-cycle security bulletin last month. The flaw in MS08-067, which affects how remote procedure calls (RPC) are handled in the Windows Server Service, has the potential to become a fast-spreading worm, according to Microsoft. But experts predict any exploitation will be […]

Read the full article →

Microsoft Plugs Critical Security Holes

by Shanmuga

"Microsoft released four "critical" security bulletins for September’s Patch Tuesday, including a massive update for Microsoft Windows GDI+ that affects multiple products.

Read the full article →

Google cuts data retention period again

by Shanmuga

"last year, it bowed to pressure from the EU and shaved six months off its retention of identity information. In a further move to avert potential legislation, Google announced yesterday that it would cut the figure in half: IP addresses in its logs will now be anonymized after nine months.

Read the full article →