Home    News Archive    Translate Traducen
News April 2007
28 April 2007

Guides, Papers, etc
blogs.securiteam.com:
Worse luck. Read more

blogs.securiteam.com:
Malware went commerical. Read more

isc.sans.org:
Lessons Learned from MS07-017. Read more

blog.siteadvisor.com:
WinFixer Strikes Again. Read more

www.viruslist.com:
Malware Miscellany, march 2007. Read more

www.avertlabs.com:
Job Offers That Might Get You in a LOT of Trouble. Read more

reviews.cnet.com:
Antispy vs. Antispy. Read more

blogs.zdnet.com:
Microsoft mulling major changes to ward off .ANI-type flaws. Read more

www.eweek.com:
Let's Get Fuzzing. Read more

www.infectionvectors.com:
Chaser: A Year of JPMorgan Chase Phish. Read more

www.infectionvectors.com:
Final Dispatch: Postcard Scams 2007. Read more

www.pcworld.com:
Antivirus Software Side-by-Side Comparison. Read more

ha.ckers.org:
Solving CAPTCHAs for Cash. Read more

news.zdnet.co.uk:
Video: Why you should encrypt your data. Watch

video.google.com:
Video: Towards HardLANs: Building intrusion detection to 1 Gbps and beyond. Watch

video.google.com:
Video: How To Break Web Software - A look at security vulnerabilities in web software. Watch

 

Vulnerabilities & Exploits
securitytracker.com:
IBM WebSphere Unspecified Flaw Has Unspecified Impact. Read more

securitytracker.com:
PostgreSQL Lets Remote Authenticated Users Gain Elevated SQL Privileges. Read more

securitytracker.com:
Novell eDirectory NCP Fragment Processing Bug Lets Remote Users Deny Service. Read more

securitytracker.com:
Symantec BackupExec Discloses Passwords to Local Users and Lets Local Users Execute Arbitrary Code. Read more

 

Tools:
www.f-secure.com:
Rescue-CD 2.00. Read more

research.pandasoftware.com:
New Panda Anti-Rootkit - Version 1.07. Read more

 

News
www.vnunet.com:
Automation the key to tackling malware. Read more

blogs.authentium.com:
Is the Security Industry fighting a losing battle? Read more

blog.washingtonpost.com:
Citibank Phish Spoofs 2-Factor Authentication. Read more

www.securityfocus.com:
No pay off in extortion attacks? Read more

www.newsfactor.com:
Malware Writers Target Google AdWords. Read more

news.zdnet.com:
Google pulls malicious sponsored links. Read more

www.vnunet.com:
Hacking damages 'routinely' overstated. Read more

www.computerworld.com:
$10K hack challenge winner says Vista's code more secure than Mac's. Read more

www.newsfactor.com:
Billion-Dollar Lawsuit Targets Big Spammers. Read more

www.internetnews.com:
Spammers Find New Ways Around Filters. Read more

www.internetnews.com:
Spammers Are Due For A Surprise. Read more

www.computerworld.com:
Satellite navigation users at risk for false messages. Read more

27 April 2007

Guides, Papers, etc
blog.washingtonpost.com:
Virus Writers Taint Google Ad Links. Read more

www.darkreading.com:
Microsoft's Happy Bugfinder. Read more

www.viruslist.com:
Malware Miscellany, february 2007. Read more

www.symantec.com:
DoS extortion is no longer profitable. Read more

www.avertlabs.com:
Malware Authors Pay to Steal Your Bank Passwords. Read more

blogs.msdn.com:
Lessons learned from the Animated Cursor Security Bug. Read more

news.zdnet.co.uk:
Video: Why Vista is a safe bet for security. Watch

www.darkreading.com:
Rutkowska Launches Own Startup. Read more

www.darkreading.com:
That's How Rumors Start. Read more

www.darkreading.com:
Discount Security. Read more

www.pcworld.com:
Companies Can't Break Ties to Adware. Read more

www.technewsworld.com:
Are Data Leaks Bleeding Your Company Dry? Read more

www.mcs.vuw.ac.nz:
Cloning Suspended VMware Virtual Machines. Read more

isc.sans.org:
The National Weather Service has issued... Read more

blog.support-intelligence.com:
Company Profile: Affiliated Computer Services. Read more

www.computerworld.com:
Audio: Computerworld TechCast: Botnets. Listen

aolradio.podcast.aol.com:
Computerworld TechCast: The Turing Test. Listen

aolradio.podcast.aol.com:
Audio: Security Now 89: WEP Insecurity. Listen

 

Vulnerabilities & Exploits
securitytracker.com:
CleverPath Input Validation Flaw Lets Remote Users Inject SQL Commands. Read more

securitytracker.com:
Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks. Read more

securitytracker.com:
Mozilla Firefox Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks. Read more

securitytracker.com:
Apple QuickTime Integer Overflow in FlipFileTypeAtom_BtoN() Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
HP-UX Sendmail Lets Remote Users Deny Service. Read more

securitytracker.com:
Apple QuickTime Heap Overflow in JVTCompEncodeFrame() Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Corel Paint Shop Pro Buffer Overflow in Processing '.clp' Files Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Adobe Photoshop Buffer Overflow in Processing BMP/DIB/RLE Files Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
blogs.msdn.com:
Debugging Tools for Windows Updated. Read more

www.cdc.informatik.tu-darmstadt.de:
aircrack-ptw. Read more

 

News
www.securityfocus.com:
New England bankers sue TJX for breach. Read more

www.theregister.co.uk:
Pentagon 'hacker' questions US cost claims. Read more

www.theregister.co.uk:
Hackers debut spam and virus sandwich. Read more

www.theregister.co.uk:
Another 419 scam ring nicked. Read more

computerworld.com:
E-mail harvesters hit with $1B antispam lawsuit. Read more

www.infoworld.com:
NY teen hacks AOL, infects systems. Read more

www.nypost.com:
TEEN IN AOL 'HACK ATTACK'. Read more

www.itnews.com.au:
Experts warn of .doc attacks. Read more

www.itnews.com.au:
Hacking tools top malware threats. Read more

26 April 2007

Guides, Papers, etc
www.securityfocus.com:
0wning Vista from the boot. Read more

www.nvlabs.in:
Video: Vbootkit on RC1 Sample video. Watch

www.nvlabs.in:
Video: Vbootkit on RC2 Sample video. Watch

www.avertlabs.com:
Breakdown: How Does AV Software Deal With Software Exploits? Read more

msmvps.com:
Winfixer and ValueClick � an oft appearing association. Read more

www.symantec.com:
Spam Attack: RARed Trojan. Read more

blogs.technet.com:
Three Microsoft Announcements. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Seven. Read more

ddanchev.blogspot.com:
Malware Infected Removable Media. Read more

ddanchev.blogspot.com:
Outsourcing The Spying on Your Wife. Read more

www.darkreading.com:
Microsoft's Happy Bugfinder. Read more

www.darkreading.com:
Microsoft's Buggin' Report. Read more

honeyblog.org:
CWSandbox vs. ALLAPLE. Read more

www.cioupdate.com:
The Trouble with Rootkits. Read more

blogs.securiteam.com:
Mozilla: Firefox 1.5 support ends in April �No, in May. Read more

www.securiteam.com:
Google Talk (gTalk) HTML Injection Technique. Read more

www.itconversations.com:
Audio: Technometria: The Virus Problem. Listen

zdpub.vo.llnwd.net:
Live From RSA: Core Puts Vista to Security Test. Listen

zdpub.vo.llnwd.net:
Live from RSA, Day 2: Security Trends and Changes. Listen

zdpub.vo.llnwd.net:
Audio: Live from RSA, Day 3: Network Security Showdown. Listen

 

Vulnerabilities & Exploits
securitytracker.com:
Cisco NetFlow Collection Engine Default Passwords Let Remote Users Access the System. Read more

securitytracker.com:
HP StorageWorks Command View XP May Let Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Linksys SPA941 Phone Can Be Crashed By Remote Users. Read more

securitytracker.com:
Asterisk Manager Interface NULL Pointer Dereference Lets Remote Users Deny Service. Read more

securitytracker.com:
Asterisk SIP Error Response Handling Bugs Let Remote Users Deny Service. Read more

securitytracker.com:
Sun Cluster Remote USCSICMD IOCTL Processing Bug Lets Remote Authenticated Users Deny Service.Read more

securitytracker.com:
CA BrightStor ArcServe Media Server Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Asterisk Buffer Overflow in SIP/SDP T.38 Support Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
enterprise.linux.com:
Review: BackTrack 2 security live CD. Read more

 

News
www.securityfocus.co:
Storm Worm marries malware and spam. Read more

www.vnunet.com:
Total malware volumes grow 'dramatically'. Read more

blog.washingtonpost.com:
Virus Writers Taint Google Ad Links. Read more

www.vnunet.com:
Microsoft rules out bounties for security exploits. Read more

securitywatch.eweek.com:
MS' e-Threat Fight Goes Global. Read more

blog.wired.com:
White House Task Force Proposes Criminalizing Harmless Hacks. Read more

www.washingtonpost.com:
Major Anti-Spam Lawsuit to Be Filed in Virginia. Read more

technology.guardian.co.uk:
Net firms 'could do more' to fight viruses. Read more

www.theregister.co.uk:
Phishers add call forwarding to their arsenal. Read more

www.theregister.co.uk:
Hackers debut malware loaded USB ruse. Read more

news.bbc.co.uk:
Heir 'hired firm to spy on wife'. Read more

25 April 2007

Guides, Papers, etc
www.matasano.com:
BREAKING: MacBook Vuln In Quicktime, Affects Win32 Apple Code. Read more

isc.sans.org:
Apple QuickTime Java Handling Unspecified Code Execution. Read more

isc.sans.org:
Microsoft Office Exploit. Read more

blogs.ittoolbox.com:
Google sponsored links not safe? Read more

sam.zoy.org:
PWNtcha - captcha decoder. Read more

www.f-secure.com:
The mystery deepens. Read more

www.darkreading.com:
Vendors Crank Up Email Security. Read more

www.darkreading.com:
Startup on Search and Destroy Mission. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
Apple QuickTime Java Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
OpenBSD IPv6 Type 0 Route Headers May Let Remote Users Deny Service. Read more

 

Tools:
stunnel.mirt.net:
stunnel - multiplatform SSL tunneling proxy. Read more

 

News
www.theregister.co.uk:
QuickTime, not Safari, to blame for MacBook vuln. Read more

blog.e-computer-security.info:
Sentencing continues to be Continued.....Julie Amero....Will it ever end? Read more

www.informationweek.com:
Malware Spikes In 1Q As Hackers Increasingly Infect Web Sites. Read more

www.whitehatsec.com:
Popular Web Sites Highly Vulnerable to Attack. Read more

news.zdnet.co.uk:
OpenOffice password crack is open to abuse. Read more

www.networkworld.com:
E-Mail Scammers to Victims: Pay Up or Die. Read more

www.freenewmexican.com:
Internet crime rises in New Mexico. Read more

www.vnunet.com:
Drug dealers move into online fraud. Read more

news.zdnet.co.uk:
Preview: Infosecurity Europe 2007. Read more

24 April 2007

Guides, Papers, etc
www.f-secure.com:
Question of the day. Read more

isc.sans.org:
New Challenge: Microsoft Office Space - A SQL With Flair. Read more

isc.sans.org:
Follow the Bouncing Malware: Day of the Jackal. Read more

www.sophos.com:
Sophos reveals rise of web-based malware in Q1 2007. Read more

blogs.zdnet.com:
Russinovich: Malware will thrive, even with Vista�s UAC. Read more

ddanchev.blogspot.com:
OSINT Through Botnets. Read more

www.darkreading.com:
Sweetening the Honeypot. Read more

www.darkreading.com:
Odds Are, You're at Risk. Read more

www.darkreading.com:
Vista Cruising. Read more

blog.siteadvisor.com:
NASCAR? No, it's the Spy Sherrif Exploit. Read more

chris.pirillo.com:
Google Calendar Security Notice. Read more

www.eweek.com:
SMTP Authentication Update. Read more

myappsecurity.blogspot.com:
Reflection on Nish Bhalla. Read more

www.securitypark.co.uk:
How to protect against botnets. Read more

www.scansafe.com:
ScanSafe Reports up to 80 Percent of Blogs Host �Offensive Content�. Read more

www.informit.com:
The Best and Worst Internet Laws. Read more

 

News
www.securityfocus.com:
Mac flaw may also affect Windows. Read more

www.theregister.co.uk:
Program Names govern admin rights in Vista. Read more

www.theinquirer.net:
Microsoft admits Vista failure. Read more

www.reuters.com:
China aims to tame Internet and spread party line. Read more

www.itnews.com.au:
Nortel warns users of critical vulnerabilities. Read more

arstechnica.com:
Child porn case shows that an open WiFi network is no defense. Read more

www.securityfocus.com:
Task force pushes for unified ID theft laws. Read more

www.theregister.co.uk:
Feds urge tougher ID theft laws. Read more

www.securitypark.co.uk:
Computer viruses and spyware are a growing threat with Social Networking and Web 2.0. Read more

www.btplc.com:
Online consumers not scared off by cyber criminals. Read more

www.pcadvisor.co.uk:
Blogs infested with porn, hatred and malware. Read more

23 April 2007

Guides, Papers, etc
support.microsoft.com:
How to disable remote administration of the DNS Server service in Windows Server 2003 and in Windows 2000 Server. Read more

blogs.securiteam.com:
Challenge to hack OS X Server. Read more

isc.sans.org:
Safari 0day? Looks like... Read more

isc.sans.org:
Trojan posing as Codecs. Read more

www.computerworld.com:
FAQ: Here's the deal on the Windows DNS bug. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Five. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Six. Read more

www.chicagotribune.com:
Public Wi-Fi may turn your life into an open notebook. Read more

www.computerworld.com:
Be Careful What You Ask For ...Read more

www.computerworld.com:
The four seasons of a virtual machine. Read more

www.matousec.com:
Windows Personal Firewall Analysis. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
ZoneAlarm 'srescan.sys' Driver Lets Local Users Gain System Privileges. Read more

 

Tools:
diit.sourceforge.net:
Digital Invisible Ink Toolkit. Read more

 

News
www.theregister.co.uk:
Safari zero-day exploit nets $10,000 prize. Read more

seclists.org:
Apparently eEye's blog got p0wnd. Read more

www.usatoday.com:
Cyberspies exploit Microsoft Office. Read more

www.azcentral.com:
Officials vow security probe at Palo Verde. Read more

www.heise.de:
German government approves retention of data. Read more

www.computeractive.co.uk:
Bulldog gives details on break in. Read more

www.latimes.com:
Google's data-storing feature fuels privacy fears. Read more

news.zdnet.co.uk:
SMEs 'blind' to illegal software risks. Read more

www.dailytech.com:
Update: STEAM Subsystem Compromised, Hacker Posts Ransom Demands. Read more

www.itnews.com.au:
Philippine government seeks a few good hackers. Read more

www.businessweek.com:
Utah mulls requiring wireless passwords. Read more

21 April 2007

Guides, Papers, etc
isc.sans.org:
port 443 / https increase. Read more

www.avertlabs.com:
Don�t Touch My Wii! Read more

theinvisiblethings.blogspot.com:
Understanding Stealth Malware. Read more

www.secureworks.com:
SecureWorks Uncovers $2 Million Russian Hacker Scheme. Read more

www.securityfocus.com:
Online Impersonations: No Validation Required. Read more

www.heise-security.co.uk:
Another hotfix for Microsoft�s ANI patch. Read more

www.infoworld.com:
Five steps for reducing unnecessary use of Administrator accounts. Read more

sunbeltblog.blogspot.com:
How one spam can ruin your day. Read more

honeyblog.org:
Security of virtual machines. Read more

blogs.ittoolbox.com:
WebAttacker is dead, long live WebAttacker. Read more

www.schneier.com:
A Security Market for Lemons. Read more

ddanchev.blogspot.com:
A Compilation of Web Backdoors. Read more

www.davidnaylor.co.uk:
Stopping bad robots with honeytraps. Read more

www.darkreading.com:
USBs' Giant Sucking Sound. Read more

www.darkreading.com:
Want Turns to Need. Read more

www.eweek.com:
The Decline of Adware. Read more

techdirt.com:
Can We Please Have Politicians Understand The Internet Before They Regulate It? Read more

taviso.decsystem.org:
An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments. Read more

www.securitydocs.com:
NetCat Tutorial. Read more

battellemedia.com:
News Analysis: Microsoft General Counsel on DoubleClick and Antitrust. Read more

 

Vulnerabilities & Exploits
blogs.securiteam.com:
Vulnerabilities fixed in ZoneAlarm - again. Read more

securitytracker.com:
PHP mail() Function Lets Remote Users Inject E-mail Headers. Read more

securitytracker.com:
Apple Help Viewer Format String Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Apple File Protocol Client Environment Variable Bug Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Nortel VPN Router Lets Remote Users Access VPNs and Administrative Functions. Read more

securitytracker.com:
Mac OS X Bugs Let Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Mac OS X writeconfig Utility Environment Variable Sanitation Bug Lets Local Users Gain Root Privileges. Read more

securitytracker.com:
Apple Installer Format String Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Apple LoginWindow Lets Local Users Bypass Authentication and Gain System Privileges. Read more

 

News
www.theregister.co.uk:
Satnav hacking made simple. Read more

www.viruslist.com:
Hacker threatens Valve with releasing its customers financial data. Read more

news.com.com:
MacBook hacked in contest at security event. Read more

www.theregister.co.uk:
Russians crack OpenOffice security. Read more

www.betanews.com:
Google Wants Your Web History. Read more

www.washingtonpost.com:
Advocates Sue Yahoo In Chinese Torture Case. Read more

20 April 2007

Guides, Papers, etc
www.f-secure.com:
Military Targets. Read more

www.viruslist.com:
Anti-Spam Appliance spammed: the protectors need protecting too. Read more

isc.sans.org:
Malware Soup du Jour. Read more

www.symantec.com:
Tales of the \u-nexpected. Read more

blog.vulnerableminds.com:
And your mother's maiden name? Read more

www.darkreading.com:
Aliens, Protein, and Bots. Read more

www.darkreading.com:
Users Confess Security Fears. Read more

www.net-security.org:
Video: New Security Features in Internet Explorer 7. Watch

 

Vulnerabilities & Exploits
securitytracker.com:
Gracenote CDDBControl ActiveX Control Buffer Overflow in Processing Proxy Control Parameters Permits Remote Code Execution. Read more

securitytracker.com:
Phorum Input Validation Holes Permits Cross-Site Scripting and SQL Injection Attacks. Read more

securitytracker.com:
BMC Performance Manager Lets Remote Users Modify the 'masterAgentName' and 'masterAgentStartLine' Parameter to Execute Arbitrary Code. Read more

securitytracker.com:
BMC Patrol Memory Corruption Error in 'bgs_sdservice.exe' May Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
IBM Tivoli Monitoring Express Heap Overflow in Universal Agent Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Novell GroupWise WebAccess Buffer Overflow in Processing HTTP Basic Authentication Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
www.secustick.nl:
The secustick is the latest ultimate device to protect your highly classified data.
Due to it�s unique technology it has the ability to destroy itself once an incorrect password has been entered. Read more

 

News
www.cnn.com:
Yahoo sued for informing China on dissidents. Read more

www.theregister.co.uk:
Phishing attack evades bank's two-factor authentication. Read more

www.securityfocus.com:
MacBooks withstand mild attacks on patch day. Read more

www.securityfocus.com:
Firmware flaw threatens routers, phones. Read more

news.zdnet.com:
Bug hunter targets routers, other gadgets. Read more

www.vnunet.com:
Nationwide cracks down on phishing. Read more

www.theregister.co.uk:
Operation Ore: evidence of massive credit card fraud. Read more

www.itnews.com.au:
Uber-rootkits challenge security community. Read more

www.theregister.co.uk:
Scumbag malware authors exploit Virginia Tech tragedy. Read more

www.itnews.com.au:
Malware spam promises Virginia Tech video. Read more

australianit.news.com.au:
How hackers got Washington. Read more

www.computerworld.com:
When World of Warcraft spreads to your world. Read more

news.zdnet.com:
Cyberattacks at federal agencies draw House scrutiny. Read more

www.dailytech.com:
Update: STEAM Subsystem Compromised, Hacker Posts Ransom Demands. Read more

newsroom.cisco.com:
Security Professionals Taking New Threats in Their Stride. Read more

techdirt.com:
Saying You Have An Open WiFi AP May Not Help You Beat Child Porn Charges. Read more

aolradio.podcast.aol.com:
Security Now 88: Your Questions, Steve's Answers #18. Listen

www.itnews.com.au:
Barracuda snaps at spammers. Read more

19 April 2007

Guides, Papers, etc
www.f-secure.com:
Warezov Back in Action? Read more

www.messagelabs.com:
MessageLabs Intelligence Targeted Attack Report: Increase in One-on-One Targeted Attacks. Read more

www.avertlabs.com:
Good Intentions Gone Awry. Read more

www.microsoft.com:
The Sender ID Framework is an e-mail authentication technology protocol that helps address the problem of spoofing and phishing by verifying the domain name from which e-mail is sent. Read more

www.eeye.com:
Zero Days, Unknown Malware, and Hackers for Hire. Read more

blogs.authentium.com:
Antivirus Testing. Read more

isc.sans.org:
We need your help: VA Tech Domains. Read more

www.sophos.com:
Barclays chip-and-pin devices will reduce - but not eliminate - risk of fraud. Read more

www.darkreading.com:
Botnets Battle Over Turf. Read more

www.darkreading.com:
Targeted Attacks on the Rise. Read more

www.darkreading.com:
Control Phreak. Read more

www.darkreading.com:
Because That's Where the Money Is. Read more

www.technewsworld.com:
The Mushrooming Menace of Keyloggers. Read more

omeganz.net:
Capture - A Honeypot Client. Read more

www.auto.tuwien.ac.at:
The 5th ACM Workshop on Recurring Malcode (WORM 2007). Read more

blog.wired.com:
Web 2.0 Expo: Vidoop and 'The New Vault'. Read more

www.mcafee.com:
Rootkits Part 2: A Technical Primer. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases. Read more

securitytracker.com:
Sun Java Web Console Format String Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
McAfee E-Business Server Administration Interface Can Be Crashed By Remote Users Sending Invalid Packet Length Header Values. Read more

securitytracker.com:
McAfee VirusScan Enterprise Buffer Overflow in Processing Multi-Byte Character Filenames May Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Oracle Database and Other Products Have Unspecified Vulnerabilities With Unspecified Impact. Read more

securitytracker.com:
webMethods Glue 'resource' Parameter Lets Remote Users Traverse the Directory. Read more

 

Tools:
www.secustick.nl:
The secustick is the latest ultimate device to protect your highly classified data.
Due to it�s unique technology it has the ability to destroy itself once an incorrect password has been entered. Read more

 

News
www.securityfocus.com:
Attackers improve on JavaScript trickery. Read more

www.securityfocus.com:
Rinbot adds attack on Microsoft DNS flaw. Read more

www.theregister.co.uk:
US Navy malware infection risked submarine prang. Read more

news.com.com:
Report: Rootkits becoming increasingly complex. Read more

www.theregister.co.uk:
Study: Users pay for Microsoft patent woes. Read more

www.sophos.com:
Malware attack poses as camera phone footage of Virginia Tech tragedy. Read more

www.allheadlinenews.com:
Hackers Invited To Break Into Philippine Internet Voting System. Read more

news.bbc.co.uk:
Two cautioned over wi-fi 'theft'. Read more

news.bbc.co.uk:
Windows XP to be retired in 2008. Read more

www.reuters.com:
China official blames Internet for youth crime. Read more

18 April 2007

Guides, Papers, etc
www.usenix.org:
The Ghost In The Browser Analysis of Web-based Malware. Read more

www.symantec.com:
The Evolution of Peacomm to "all-in-one" Trojan. Read more

isc.sans.org:
Phishers taking advantage of Virginia Tech tragedy. Read more

www.sophos.com:
Worm spreads via zero day Microsoft DNS vulnerability. Read more

www.f-secure.com:
Question of the day. Read more

sunbeltblog.blogspot.com:
The definition of audacity. Read more

sunbeltblog.blogspot.com:
A new slicker image spam. Read more

blogs.securiteam.com:
Follow up to my post about my ex-ISP�s backdoor. Read more

blogs.ittoolbox.com:
The world has changing. Read more

www.avertlabs.com:
Another passenger for your bus? Read more

www.youtube.com:
Video: Ctrl + Alt + Del: the history...Watch

 

Vulnerabilities & Exploits
www.frsirt.com:
McAfee VirusScan Enterprise On-Access Scan Remote Command Execution Vulnerability. Read more

securitytracker.com:
Akamai Download Manager ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Clam AntiVirus Buffer Overflow in cab_unstore() Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
www.itsecurity.com:
103 Free Security Apps for Mac, Windows and Linux. Read more

 

News
news.bbc.co.uk:
Online banking fraud 'up 8,000%'. Read more

blog.wired.com:
GoDaddy Registers Dozens of Questionable Virginia Tech Names. Read more

blog.wired.com:
Profiteers Snap Up Virginia Tech Domains? Read more

www.theregister.co.uk:
ISP ejects whistle-blowing student. Read more

www.vnunet.com:
Experts call for public disclosure of information leaks. Read more

news.bbc.co.uk:
Wireless hijacking under scrutiny. Read more

www.darkreading.com:
Experts: DNS Attacks Could Go Deeper. Read more

www.theregister.co.uk:
University admins lend phishers a hand. Read more

www.theregister.co.uk:
Phishers spread their nets. Read more

www.theregister.co.uk:
Adware poses as ActiveX control. Read more

www.infoworld.com:
P2P worms get their turn. Read more

www.vnunet.com:
Stiletto model malware spreads via Skype. Read more

17 April 2007

Guides, Papers, etc
www.symantec.com:
Attacks on Virtual Machine Emulators. http://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf

blog.spywareguide.com:
Chinese VM Detection, With a Splash of Adware. Read more

blog.spywareguide.com:
China Internet Network Information Center: On Your PC Whether You Want Them or Not. Read more

www.avertlabs.com:
RPC DNS Worm Spotted In The Wild. Read more

www.avertlabs.com:
Validating the sender domain (Keeping spam out of the network #2). Read more

www.sophos.com:
New model malware spreads stiletto pics via Skype. Read more

isc.sans.org:
New Rinbot scanning for port 1025 DNS/RPC. Read more

www.darkreading.com:
SCADA State of Denial. Read more

www.darkreading.com:
WiFi Wevenge. Read more

www.darkreading.com:
Nada Day. Read more

www.kbcafe.com:
YouTube Spam. Read more

myappsecurity.blogspot.com:
Reflection on Ory Segal. Read more

www.securityfocus.com:
Notes On Vista Forensics, Part One. Read more

www.securityfocus.com:
Notes On Vista Forensics, Part Two. Read more

www.rsf.org:
Handbook for bloggers and cyber-dissidents. Read more

www.sans.org:
CyberLaw 101: A primer on US laws related to honeypot deployments. Read more

www.eweek.com:
Restarting the Internet ... Again. Read more

podcasts.mcafee.com:
Audio:AudioParasitics Episode 4, Listen

 

Vulnerabilities & Exploits
securitytracker.com:
SSH Tectia Server Insecure File Permissions May Let Local Users Gain Elevated Privileges. Read more

www.nop-art.net:
A buffer overflow vulnerability has been found in airodump-ng, part of the aircrack-ng package. Read more

 

News
www.theregister.co.uk:
Zombies infiltrate US military networks. Read more

blogs.zdnet.com:
Microsoft�s advisories giving clues to hackers. Read more

www.securityfocus.com:
Report: Lenders illicitly accessing student database. Read more

www.computerworld.com:
Feds get an overall 'C' on security; a third of agencies get 'F's. Read more

www.securityfocus.com:
Microsoft warns of DNS server attacks. Read more

news.bbc.co.uk:
Employers warned on email spying. Read more

www.renesys.com:
IPv6 is for Porn? Read more

www.theregister.co.uk:
Skype IM malware smut surfaces. Read more

www.computerweekly.com:
Malware outbreak 'largest in almost a year'. Read more

www.kuwaittimes.net:
Botnets a hidden menace. Read more

news.zdnet.co.uk:
Storm worm stirs up email virus chaos. Read more

greenvilleonline.com:
Student charged with hacking school computers. Read more

today.reuters.co.uk:
Four-fold increase in serious child abuse on Web. Read more

www.prnewswire.com:
Man Sentenced to Life in Prison for Producing Video of Toddler Being Sexually Abused. Read more

16 April 2007

Guides, Papers, etc
isc.sans.org:
Update on Microsoft DNS vulnerability. Read more

www.f-secure.com:
Another Skype Worm. Read more

isc.sans.org:
Gaming Malware. Read more

www.internetnews.com:
Cybersquatters Beware TypoSquasher. Read more

blogs.securiteam.com:
extractQuotedChar() function blamed for RPC vulnerability. Read more

www.sans.org:
Egress Filtering FAQ. Read more

www.blackhat.com:
Attack Patterns: Knowing Your Enemies in Order to Defeat Them. Read more

www.irongeek.com:
Video: Making Windows Trojans with EXE Binders (AKA:Joiners), Splice and IExpress. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
LANDesk Management Suite Buffer Overflow in 'Aolnsrvr.exe' Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
a2-blog.com:
Play Games at Work, Surf the Net, Chat, etc. Undetected. Read more

 

News
www.philly.com:
'Hacker Boot Camp' teaches security tactics. Read more

www.msnbc.msn.com:
The IRS warns of a late-breaking Internet tax scam, just before the April 17 deadline. Are you at risk? Read more

tech.monstersandcritics.com:
Long weekend for IT professionals due to DNS vulnerability. Read more

australianit.news.com.au:
Scrap the net and start again. Read more

14 April 2007

Guides, Papers, etc
blogs.securiteam.com:
Microsoft: Yes, the Windows Server DNS vuln exists. Read more

isc.sans.org:
More info on the Windows DNS RPC interface vulnerability. Read more

blogs.technet.com:
More information on Microsoft Security Advisory 935964. Read more

blogs.securiteam.com:
When is a security researcher (white hacker) a journalist? Read more

secmaniac.blogspot.com:
Microsoft DOC bugs and friends. Read more

sunbeltblog.blogspot.com:
Google buys DoubleClick. And is now the most powerful behavioral marketer on the planet. Read more

sunbeltblog.blogspot.com:
Omerta still dealing with fake Omerta malware. Read more

blog.vulnerableminds.com:
Sometimes its better to sleep on it. Read more

www.darkreading.com:
Zero-Day Fever. Read more

www.darkreading.com:
That Air of Danger. Read more

www.darkreading.com:
Strength in Numbers. Read more

www.processor.com:
One-Time Password Technology. Read more

www.infoworld.com:
Five steps for reducing unnecessary use of Administrator accounts. Read more

www.washingtonpost.com:
'Delete' Doesn't Mean 'Disappear'. Read more

www.eweek.com:
Consumers Care About Security a Lot Less Than They Say They Do. Read more

www.technewsworld.com:
ID Theft Knows No Boundaries. Read more

bindshell.net:
Manipulating FTP Clients Using The PASV Command. Read more

www.f-secure.com:
Video - Rock Phish. Read more

www.youtube.com:
Video: Hacking Cisco NAC - NACATTACK. Read more

 

Vulnerabilities & Exploits
www.microsoft.com:
Vulnerability in RPC on Windows DNS Server Could Allow Remote Code Execution. Read more

securitytracker.com:
Solaris IP Stack Fragment Processing Bug Lets Remote Users Degrade Performance. Read more

securitytracker.com:
Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Opera IFRAME Character Encoding Inheritence Permits Cross-Site Scripting Attacks. Read more

 

News
www.computerworld.com:
Microsoft: Dangerous DNS server bug in Longhorn code, too. Read more

blog.washingtonpost.com:
Fortune 500s Unwittingly Become Spammers. Read more

www.securityfocus.com:
U.S. agencies get 'C-' for computer security. Read more

www.usatoday.com:
Researchers explore scrapping, rebuilding the Net. Read more

www.securityfocus.com:
Microsoft to wait and see on Vista activation hacks. Read more

www.theregister.co.uk:
Accused Pentagon hacker prosecution could backfire. Read more

www.theregister.co.uk:
Evil twins spread zombie plague. Read more

www.computerworld.com:
Massive spam shot of 'Storm Trojan' reaches record proportions. Read more

www.theregister.co.uk:
Killer virus hoax panics Pakistan. Read more

www.vnunet.com:
Bush under fire over '5 million' disappearing emails. Read more

www.theregister.co.uk:
China cracks down on net porn. Read more

content.hamptonroads.com:
Ex-contractor sentenced for sabotaging Navy subs. Read more

13 April 2007

Guides, Papers, etc
www.f-secure.com:
Zhelatin, Zipped, Zecurity? Read more

www.avertlabs.com:
You�re infected! Read more

isc.sans.org:
Microsoft Vulnerability in RPC on Windows DNS Server. Read more

isc.sans.org:
EXE/ZIP e-mail viruses (editorial). Read more

www.symantec.com:
Spam Attack: Zipped Trojan. Read more

blogs.authentium.com:
The Eye of the Storm. Read more

blog.siteadvisor.com:
Amusement Park Typosquatters Install Toolbar via Exploit. Read more

www.sophos.com:
Party girl Paris Hilton subject of Microsoft vulnerability spam attack. Read more

ha.ckers.org:
The Irony of Admin Passwords In Multi Admin Environments. Read more

www.darkreading.com:
X-Force Predicts Microsoft Exploit. Read more

www.darkreading.com:
10 Hot Security Startups. Read more

aolradio.podcast.aol.com:
Audio: Security Now 87: SQL Injection. Listen

 

Vulnerabilities & Exploits
securitytracker.com:
Cisco Wireless LAN Controller Lets Remote Users Modify the Configuration and Deny Service. Read more

securitytracker.com:
Cisco Wireless Control System Lets Remote Users Read/Write Files and Remote Authenticated Users Gain Elevated Privileges. Read more

securitytracker.com:
CinePlayer Buffer Overflow in 'SonicDVDDashVRNav.dll' Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Apache suEXEC Bugs May Let Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Adobe Flash Player on Opera Has a Vulnerability with Unspecified Impact. Read more

 

News
news.zdnet.co.uk:
Vista DRM could hide malware. Read more

news.zdnet.co.uk:
Attackers target Windows DNS flaw. Read more

www.vnunet.com:
Microsoft investigates 4 new bugs. Read more

www.theregister.co.uk:
Cisco wireless products suffer multiple vulns. Read more

www.vnu.co.uk:
Evil Trojan twins control most of world's botnets. Read more

www.theregister.co.uk:
How much do security breaches cost anyway? Read more

www.vnunet.com:
Wikipedia 'broken beyond repair' says co-founder. Read more

12 April 2007

Guides, Papers, etc
redtape.msnbc.com:
WHO'S BEHIND CRIMINAL BOT NETWORKS? Read more

blogs.securiteam.com:
A Botted Fortune 500 a Day. Read more

blogs.securiteam.com:
Unusual smail (SPAM mail). Read more

www.securecomputing.net.au:
Hot or Not: Local privilege escalation vulnerabilities. Read more

ha.ckers.org:
Inter Protocol Exploitation. Read more

sunbeltblog.blogspot.com:
Spam with malware links. Read more

blogs.authentium.com:
Trojan.ADVQ. Read more

www.zone-h.org:
Microsoft leaves an open door to phishers! Read more

www.gnucitizen.org:
Application Layer Anti-virus/Firewall. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Three . Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Two. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample One. Read more

www.darkreading.com:
Mobile Phones: Hackers' Next Target. Read more

blog.support-intelligence.com:
Aflac Meet Mr. ED. Read more

www.usenix.org:
The Anatomy of Clickbot.A. read more

isiom.wssrl.org:
Optimising Malware. Read more

isiom.wssrl.org:
And you though you were safe after SLAMMER, not so, Swarms not Zombies present the greatest risk to our national internet infrastructure. Read more

www.infectionvectors.com:
Chaser: A Year of JPMorgan Chase Phish. Read more

www.infectionvectors.com:
Final Dispatch: Postcard Scams 2007. Read more

www.greatwhitesnark.com:
Why Bill Gates can�t get no respect. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed. Read more

securitytracker.com:
Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Adobe Bridge Lets Local Users Gain Administrative Privileges. Read more

securitytracker.com:
Macromedia ColdFusion Unsafe Directory Permissions Lets Local Users Gain Root Privileges. Read more

 

News
www.securityfocus.com:
Consumers dump breached retailers, says study. Read more

www.theregister.co.uk:
Microsoft 'wait-and-see' on Vista BIOS hack. Read more

www.theregister.co.uk:
Five critical reasons to update Windows today. Read more

news.zdnet.co.uk:
McAfee journal offers 'Sage' security advice. Read more

apcmag.com:
Windows XP to be phased out by year's end despite customer demand. Read more

www.expatica.com:
German minister wants access to private computers. Read more

11 April 2007

Guides, Papers, etc
www.sophos.com:
Sophos research reveals dirty dozen spam-relaying nations. Read more

www.pandasoftware.com:
Sdbot and Gaobot make up most botnets. Read more

www.f-secure.com:
April's Security Update. Read more

ddanchev.blogspot.com:
Shots from the Malicious Wild West - Sample Four. Read more

ddanchev.blogspot.com:
Month of Malware Bugs Coming. Read more

www.eweek.com:
Harvesting Teenagers. Read more

techdirt.com:
FTC Wants Time In The Clink For Spyware Distributors. Read more

www.darkreading.com:
Your Own Users? Hacking? Read more

www.darkreading.com:
Critical WiFi Bug Found on Linux. Read more

www.avertlabs.com:
eThugs-R-US. Read more

ha.ckers.org:
Can I hide.to? Read more

www.plagiarismtoday.com:
Why Wordpress.com is Virtually Spam Free. Read more

www.lightbluetouchpaper.org:
There aren�t that many serious spammers any more. Read more

www.securitycadets.com:
411-spyware.com - The new forum spammers? Read more

blog.vulnerableminds.com:
ShmooCon '07 Hack or Halo Virtual Machines Released. Read more

www.financialexpress.com:
Crime and punishment in cyberspace. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
Windows Kernel Memory Mapping Permission Error Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Windows Vista Client-Server Run-time Subsystem Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Windows XP Universal Plug and Play Lets Remote Users on the Local Subnet Execute Arbitrary Code. Read more

securitytracker.com:
Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
HP-UX Portable File System Lets Remote Users Gain Elevated Privileges. Read more

securitytracker.com:
HP-UX Running ARPA Transport Software Lets Local Users Deny Service. Read more

securitytracker.com:
ICQ File Transfer Traversal Flaw Lets Remote Users Modify the Storage Location During a File Transfer. Read more

securitytracker.com:
AIM File Transfer Traversal Flaw Lets Remote Users Modify the Storage Location During a File Transfer. Read more

securitytracker.com:
AirPort Extreme Base Station with 802.11n Discloses Filenames to Remote Users and Allows Incoming IPv6 Connections. Read more

 

Tools:
www.grisoft.com:
AVG Anti-Rootkit Free. Read more

blog.wired.com:
Geek Doormat for Those Who Don't Get Out Much. Read more

 

News
www.securityfocus.com:
Eastern European crime in on ANI attacks too. Read more

www.theregister.co.uk:
Trial in 419-related murder under way. Read more

www.theregister.co.uk:
Mozilla seeks security researchers to look at alpha code. Read more

www.vnunet.com:
Shoppers risk their information online. Read more

news.com.com:
FTC official: Let's imprison spyware distributors. Read more

www.computing.co.uk:
Cyber criminals to increasingly target mobile devices. Read more

www.infoworld.com:
McAfee: Cyber-crime will continue to pay. Read more

www.technewsworld.com:
Free Antivirus Download Roots Out Rootkits. Read more

arstechnica.com:
Spam to overtake human-issued e-mails in 2007. Read more

10 April 2007

Guides, Papers, etc
www.alex-ionescu.com:
Why Protected Processes Are A Bad Idea. Read more

www.alex-ionescu.com:
Introducting D-Pin Purr v1.0 - 32bit Edition. Read more

blogs.technet.com:
Microsoft Knowledge Base Article 925902 Updated. Read more

blogs.technet.com:
Botnets by Email. Read more

www.avertlabs.com:
Exploit-TaroDrop.b � Heuristics vs 0-day Gymnastics. Read more

www.avertlabs.com:
Obfuscating Image Files for Fun and Profit. Read more

www.symantec.com:
Trojan.Peacomm: Building a Peer-to-Peer Botnet. Read more

www.symantec.com:
Trojan.Peacomm Part 2 � The Botnet Evolves. Read more

isc.sans.org:
exe malware spammed under "Missile War" subjects. Read more

sunbeltblog.blogspot.com:
Protectwin (dot) com hijacks user desktops. Read more

sunbeltblog.blogspot.com:
Protectwin: The movie. Read more

www.securitycadets.com:
Ultimate Fixer, a Rogue to fix all your system woes. Not! Read more

msmvps.com:
An increase in attempts to exploit the Symantec Antivirus Remote Stack Buffer Overflow Vulnerability has been reported. Read more

blogs.ittoolbox.com:
ANI - Monday Apr 9th. Read more

hexblog.com:
Decompilation gets real. Read more

www.darkreading.com:
Researchers Put Nail in WEP's Coffin. Read more

www.darkreading.com:
WEP Wakeup Call. Read more

www.darkreading.com:
PCI Won't Save You. Read more

rdist.root.org:
JTAG attacks and PR submarines. Read more

www.cybsec.com:
Attacking the Giants: Exploiting SAP Internals. Read more

www.computerworld.com.sg:
Gartner: Virtualization security risks being overlooked. Read more

www.networkworld.com:
Has the end arrived for desktop antivirus? Read more

blog.tmcnet.com:
Microsoft Security as Humor, Salesforce.com's ContentExchange from Korel Buy, Customer Connect, Creston. Read more

 

Vulnerabilities & Exploits
labs.idefense.com:
AOL AIM and ICQ File Transfer Path-Traversal Vulnerability. Read more

securitytracker.com:
iPIX Image Well ActiveX Control Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Ichitaro Bug Lets Remote Users Execute Arbitrary Code. Read more

 

Tools:
theartoffuzzing.com:
ProxyFuzz is a man-in-the-middle non-deterministic network fuzzer written in Python. Read more

 

News
www.informationweek.com:
Microsoft Repatches Its .ANI Emergency Patch. Read more

www.securityfocus.com:
Storm Worm exploits Mideast tensions. Read more

www.symantec.com:
Middle East War, or just more junk email? Read more

www.itnews.com.au:
Experts: Install .ani patch immediately. Read more

www.eweek.com:
Microsoft ANI Patch Causes Problems with Third-Party Apps. Read more

www.theregister.co.uk:
ANI takers for Asus website virus? Read more

australianit.news.com.au:
Security must adapt to 'digital mafia'. Read more

www.theregister.co.uk:
Laptop thefts expose 40,000 Chicago teachers. Read more

news.softpedia.com:
Winamp Might Help an Attacker Exploit Your System. Read more

www.vnu.co.uk:
IT workers back 'Nasa hacker' McKinnon. Read more

ha.ckers.org:
Prosecute Victims - Worst Idea Ever? Read more

news.com.com:
No end in sight to hacking of 'WoW' accounts. Read more

www.vnunet.com:
Spam makes users turn away from email. Read more

www.computerworld.com:
Privacy Advocate Pushes to Protect Data in Public Records. Read more

www.terra.net.lb:
China moves to tackle Internet gaming addiction. Read more

www.boston.com:
Court: MySpace postings are free speech. Read more

07 April 2007

Guides, Papers, etc
blogs.securiteam.com:
It�s time to see iPodLinux PoC virus. Read more

www.websense.com:
Analysis of Malware Spread via SPAM and ANI vulnerability. Read more

www.darkreading.com:
Whirlpool Spins New Address Scheme. Read more

www.darkreading.com:
A 90-Proof Concept. Read more

www.darkreading.com:
Jack of All Security Trades. Read more

www.informationweek.com:
10 Tip To Survive Online Tax Hacker & Phishing Attacks. Read more

news.bbc.co.uk:
'Cheating' the search engines. Read more

www.infoworld.com:
When identity theft becomes standard operating procedure. Read more

www.networkcomputing.com:
He Said/He Said/He Said: Cracking on WEP. Read more

www.esecurityplanet.com:
The Critical XP Wi-Fi Patch You Need Today. Read more

myappsecurity.blogspot.com:
Reflection on Chris Shiflett. Read more

support.microsoft.com:
You may receive an "Access is denied" error message when you try to access a Web page that contains a script in Internet Explorer 6. Read more

support.microsoft.com:
Internet Explorer 6 may stop responding and does not display images in a Web page on a Windows XP Service Pack 2-based computer. Read more

www.blackhat.com:
Implementing and Detecting a PCI Rootkit. Read more

www.blackhat.com:
Software Virtualization Based Rootkits. Read more

www.blackhat.com:
Exploiting Similarity Between Variants to Defeat Malware. Read more

geekz.co.uk:
Bruce Schneier Facts. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
Winamp MATLAB/ScreamTracker/Impulse Tracker File Memory Corruption Errors Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Kaspersky Internet Security ActiveX Controls Let Remote Users View and Delete Files. Read more

securitytracker.com:
Kaspersky Anti-Virus ActiveX Controls Let Remote Users View and Delete Files. Read more

securitytracker.com:
Kaspersky Internet Security Buffer Overflow in Processing ARJ Archives Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Kaspersky Anti-Virus Buffer Overflow in Processing ARJ Archives Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Symantec Enterprise Security Manager Upgrade Interface Lets Remote Users Execute Arbitrary Code. Read more

 

News
www.informationweek.com:
Security Researchers Say Windows .ANI Problem Surfaced Two Years Ago. Read more

www.computerworld.com:
Researchers question Vista security after ANI exploit. Read more

www.securityfocus.com:
In Other News: Lame iPod virus, ASUS gets ANI'd. Read more

www.technewsworld.com:
iPod Proof-of-Concept Virus: No Teeth, No Legs. Read more

www.vnunet.com:
Microsoft gets back on the patch train for April. Read more

news.bbc.co.uk:
Cursor hackers target WoW players. Read more

blog.wired.com:
Court Okays Counter-Hack of eBay Hacker's Computer (Updated). Read more

www.cnn.com:
Turkey to block 'insulting' Web sites. Read more

www.torontosun.com:
Lottery scams rampant, says Competition Bureau. Read more

www.thedenverchannel.com:
Three Men Arrested In National Internet Sex Sting. Read more

06 April 2007

Guides, Papers, etc
www.viruslist.com:
iNfector for iPod. Read more

www.viruslist.com:
asus.com compromised: link to ANI exploit. Read more

www.f-secure.com:
iPod virus. Read more

www.symantec.com:
Farewell Graybird? Read more

www.symantec.com:
JIKTO Out and About. Read more

www.avertlabs.com:
One Spam Not To Open..Read more

blogs.msdn.com:
.avi exploit via e-mail: you'd think hackers would know how to spell 'Britney Spears'. Read more

blogs.ittoolbox.com:
ANI -Thursday evening ... late. Read more

www.sophos.com:
Less than half of IT professionals want McKinnon jailed for hacking crimes. Read more

www.eweek.com:
How Can We Take Domains Down Faster? Read more

www.determina.com:
Heap FengShuiin JavaScript. Read more

www.cybsec.com:
EXPLOITING SAP INTERNALS. A SECURITY ANALYSIS OF THE RFC INTERFACE IMPLEMENTATION. Read more

www.determina.com:
Exploiting Vista with ANI. Watch

taosecurity.blogspot.com:
Monitoring and Investigation Lessons. Read more

taosecurity.blogspot.com:
Taking the Fight to the Enemy Revisited. Read more

www.darkreading.com:
Solving IPTV's Security Problem. Read more

www.darkreading.com:
Hacking Bluetooth With a USB Stick. Read more

www.darkreading.com:
Laptop Lockdown. Read more

www.cybercrime.gov:
Prosecuting Computer Crimes. Read more

www.blackhat.com:
New Botnets Trends and Threats. Read more

aolradio.podcast.aol.com:
Audio: Security Now 86: Cross Site Scripting Part II. Listen

rusiriusradio.com:
Audio: Show #98: Everything The US Government is Doing About Security is Wrong. Listen

news.zdnet.co.uk:
Video: Windows cursor hack in action. Read more

 

Vulnerabilities & Exploits
www.frsirt.com:
VMware ESX Update Fixes Multiple Code Execution and Denial of Service Vulnerabilities. Read more

securitytracker.com:
Enterasys NetSight TFTPD and BOOTPD Servers Permit Remote Code Execution and Denial of Service Attacks. Read more

securitytracker.com:
ArcSDE Stack Overflow Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Kaspersky Anti-Virus for Workstations/File Server Heap Overflow in 'klif.sys' Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Kaspersky Internet Security Heap Overflow in 'klif.sys' Lets Local Users Gain Elevated Privileges. Read more

securitytracker.com:
Kaspersky Anti-Virus 'AxKLSysInfo.dll' ActiveX Control Lets Remote Users View Files. Read more

 

Tools:
www.hamachi.cc:
LogMeIn Hamachi is a zero-configuration virtual private networking (VPN) application. Read more

 

News
www.irishdev.com:
NASA hacker Gary McKinnon should NOT be sent to a US jail. Read more

www.computerworld.com.au:
Hackers offer subscription, support for their malware. Read more

www.newsfactor.com:
Microsoft Defends ANI Patch Delay. Read more

www.theregister.co.uk:
Linux malware for iPods poses little risk. Read more

www.theregister.co.uk:
Britney fears used as ANI exploit lure. Read more

news.bbc.co.uk:
Cursor hackers target WoW players. Read more

www.computerworld.com:
Researcher has new attack for embedded devices. Read more

www.technewsworld.com:
Retail Groups, FBI Launch Crime-Fighting Database. Read more

www.infoworld.com:
When identity theft becomes standard operating procedure. Read more

www.microsoft-watch.com:
Consumer Inertia Holds Back Vista. Read more

05 April 2007

Guides, Papers, etc
blogs.technet.com:
An inside look into building and releasing MS07-017. Read more

www.net-security.org:
Hackers convened in Amsterdam for Black Hat Europe. Read more

www.zone-h.org:
Crazy about ethical hacking. Read more

www.it-observer.com:
Image Spam: Getting the Picture? Read more

blogs.msdn.com:
Protected Mode for IE7 in Windows Vista - Is it On or Off? Read more

isc.sans.org:
telnetd deja vu, this time it is Kerberos 5 telnetd. Read more

isc.sans.org:
Is WEP dead yet? Should it be? Read more

isc.sans.org:
Various Vista Concerns. Read more

www.guardian.co.uk:
Story of a Credit Card Fraudster. A con as big as the Ritz, part 1. Read more

www.guardian.co.uk:
A con as big as the Ritz, part 2. Read more

www.wired.com:
Security Matters: Vigilantism Is a Poor Response to Cyber Attack. Read more

www.usenix.org:
First Workshop on Hot Topics in Understanding Botnets. Read more

www.expresscomputeronline.com:
Peeping into the hacker�s mind. Read more

www.darkreading.com:
Same as It Ever Was. Read more

www.mnin.org:
Analysis of ANI �anih� Header Stack Overflow Vulnerability, Microsoft Security Advisory 935423. Read more

www.reghardware.co.uk:
Why I won't buy a Dell next time. Read more

podcasts.mcafee.com:
Audio: AudioParasitics Episode 3. Listen

 

Vulnerabilities & Exploits
www.gnucitizen.org:
Firebug Goes Evil. Read more

labs.idefense.com:
Kaspersky AntiVirus SysInfo ActiveX Control Information Disclosure Vulnerability. Read more

labs.idefense.com:
Kaspersky Internet Security Suite klif.sys Heap Overflow Vulnerability. Read more

www.zerodayinitiative.com:
Yahoo! Messenger AudioConf ActiveX Control Buffer Overflow Vulnerability. Read more

securitytracker.com:
IBM Lotus Domino Web Access Input Validation Hole in Processing Multipart MIME Messages Permits Cross-Site Scripting Attacks. Read more

securitytracker.com:
IBM Tivoli Business Service Manager Discloses Passwords to Local Users. Read more

securitytracker.com:
X11 libx11 Integer Overflow Lets Remote Users Deny Service. Read more

 

Tools:
www.microsoft.com:
Internet Connectivity Evaluation Tool. Read more

theartoffuzzing.com:
ProxyFuzz is a man-in-the-middle non-deterministic network fuzzer written in Python. Read more

databasement.net:
LocalRodeo - Client-side protection against JavaScript Malware. Read more

 

News
www.securityfocus.com:
Developers warned to secure AJAX design. Read more

www.securityfocus.com:
Briton charged with hacking loses extradition fight. Read more

www.theregister.co.uk:
Researchers unpick Vista kernel protection. Read more

www.theregister.co.uk:
MS releases emergency cursor bug fix. Read more

www.informationweek.com:
Hackers Promise 'Nude Britney Spears' Pix To Plant .ANI Exploit. Read more

www.computerweekly.com:
ABN pays out over hacked accounts. Read more

www.viruslist.com:
UAE gets new special anti-cybercrime body. Read more

www.virusbtn.com:
Spam costing US companies over $70 billion per year. Read more

www.washingtonpost.com:
Domain name application gives phishers a new foe. Read more

www.thisishampshire.net:
Identity theft nightmare. Read more

www.theage.com.au:
Bracing for attack Read more

www.publictechnology.net:
One third of UK firms don't report their security crime. Read more

arstechnica.com:
New attack cracks WEP in record time. Read more

www.securitycadets.com:
Chinese Adware Bundle with a Government Related Surprise. Read more

04 April 2007

Guides, Papers, etc
www.f-secure.com:
ANI Patch now Released! Read more

support.microsoft.com:
The Realtek HD Audio Control Panel may not start, and you receive an error message when you start the computer: "Illegal System DLL Relocation". Read more

www.avertlabs.com:
ANI Exploits Made Easy. Read more

www.avertlabs.com:
ANI Patch Released, Patch ASAP. Read more

www.websense.com:
Email Lures for ANI Zero-Day. Read more

blogs.authentium.com:
ANI Exploits, NX-bit, DEP, Protected Mode� jargon. Read more

blogs.securiteam.com:
Month of PHP Bugs: 31 days, 44 vulns. Read more

www.darkreading.com:
Malware & Attacker, Exposed. Read more

www.mb.com.ph:
How to spot fake Web sites. Read more

www.cdc.informatik.tu-darmstadt.de:
aircrack-ptw. Read more

blogs.ittoolbox.com:
Creative, Criminal, And Caught! Read more

aolradio.podcast.aol.com:
Audio: Security Now Special Edition: The Animated Cursor Vulnerability. Listen

 

Vulnerabilities & Exploits
securitytracker.com:
X11 Overflows Let Local Users Gain Root Privileges. Read more

securitytracker.com:
SolidWorks sldimdownload ActiveX Control Lets Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
Kerberos kadmin 'gss_buffer_t' May Be Freed Twice Allowing Remote Authenticated Users to Execute Arbitrary Code. Read more

securitytracker.com:
Kerberos kadmin/KDC Stack Overflow in krb5_klog_syslog() Lets Remote Authenticated Users Execute Arbitrary Code. Read more

securitytracker.com:
Kerberos telnetd Grants Access to Remote Users. Read more

securitytracker.com:
Windows Kernel GDI Color Parameter Bug Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Windows Kernel GDI Input Validation Flaw in Processing Application Size Parameters Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Windows TrueType Font Rasterizer Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Windows Kernel EMF Image Processing Bug Lets Local Users Gain System Privileges. Read more

securitytracker.com:
Windows Kernel WMF Image Processing Lets Remote Users Deny Service. Read more

securitytracker.com:
HP Mercury Quality Center Lets Remote Authenticated Users Execute SQL Commands. Read more

securitytracker.com:
IBM AIX Buffer Overflow in drmgr Command May Let Local Users Gain Elevated Privileges. Read more

securitytracker.com:
IBM Tivoli Provisioning Manager Memory Corruption Error in Processing HTTP POST Requests May Let Remote Users Execute Arbitrary Code. Read more

securitytracker.com:
ImageMagick DCM and XCM Buffer Overflows Let Remote Users Execute Arbitrary Code. Read more

 

News
www.microsoft.com:
Microsoft Security Bulletin Summary for April 2007. Read more

isc.sans.org:
Microsoft Patch Maybe Causing Some Problems. Read more

www.reuters.com:
British hacker loses U.S. extradition appeal. Read more

www.heise-security.co.uk:
From root kit to boot kit: Vista's code signing compromised. Read more

www.theregister.co.uk:
Windows Vista license change tackles virtualization. Read more

www.networkworld.com:
First-hand account: How free Web hosters profit from phishing sites. Read more

www.register-herald.com:
IRS warns of phony e-mails claiming to come from IRS. Read more

www.channel4.com:
25% 'completely exposed' to hackers. Read more

www.reuters.com:
FBI checks gambling in Second Life virtual world. Read more

www.channelregister.co.uk:
Microsoft hits Middle East pirates. Read more

03 April 2007

Guides, Papers, etc
blogs.securiteam.com:
Put Security Alongside .XXX. Read more

blogs.securiteam.com:
eEye�s Patch - Bypassed. Read more

blogs.securiteam.com:
Bleeding edge Snort rule won�t catch all (ANI). Read more

www.f-secure.com:
Warezov Returns. Read more

www.symantec.com:
Day One for Zero-Days � ISTR XI Vulnerability Trends. Read more

www.avertlabs.com:
S-s-s-something From the Comments. Read more

www.avertlabs.com:
�MovieCommander! No it�s DnsChanger�. Read more

isc.sans.org:
Week of Vista bugs is a hoax. Read more

erratasec.blogspot.com:
ANI 0day vs. intrusion detection providers. Read more

asert.arbornetworks.com:
Nugache: TCP port 8 Bot. Read more

reviews.cnet.com:
Botnets for sale. Read more

www.computerworld.com.au:
Rootkits outfox old-school malware protection. Read more

logicx.net:
Jikto Source Code Situation. Read more

portal.spidynamics.com:
Jikto in the wild. Read more

www.websense.com:
Automated Defacement through Search Engines. Read more

www.fortifysoftware.com:
JavaScript Hijacking. Read more

www.darkreading.com:
A Hack With Teeth. Read more

www.darkreading.com:
Where's Security? Read more

www.theregister.co.uk:
Day dawns for Metasploit 3.0. Read more

conf.vnsecurity.net:
Call for Papers for VNSECON Security Conference 2007. Read more

windowshelp.microsoft.com:
Telnet: frequently asked questions. Read more

www.ig.energy.gov:
Internal Controls Over Computer Property at the Department�s Counterintelligence Directorate. Read more

www.eweek.com:
This eWeek. Read more

www.securinfos.info:
Attacking and Repairing the WinZip Encryption Scheme. Read more

www.securinfos.info:
Concepts for the Stealth Windows Rootkit. Read more

www.facetime.com:
Video: Botnet Live Presentation from this years RSA 2007. Watch

media.medialink.com:
Audio: Hackers Targeting Smart Phones and PDAs. Listen

 

Vulnerabilities & Exploits
securitytracker.com:
Norton Internet Security 'SPBBCDrv.sys' Driver Lets Local Users Deny Service and Potentially Gain Elevated Privileges. Read more

securitytracker.com:
Norton Personal Firewall 'SPBBCDrv.sys' Driver Lets Local Users Deny Service and Potentially Gain Elevated Privileges. Read more

 

Tools:
vil.nai.com:
McAfee Rootkit Detective Beta. Read more

www.gfi.com:
GFI LANguard Network Security Scanner (N.S.S.) 8. Read more

 

News
www.microsoft.com:
Microsoft Security Bulletin Advance Notification. Read more

www.securityfocus.com:
Microsoft readies emergency ANI patch. Read more

news.xinhuanet.com:
Why 3 months for MS to issue .ANI security patch? Read more

www.techworld.com:
JavaScript botnet code leaked to web. Read more

www.finextra.com:
Man-in-the-middle phishing kits for sale on the Web. Read more

www.moneyextra.com:
How to report online banking fraud. Read more

arstechnica.com:
China: Better at censoring blogs than malware. Read more

www.sophos.com:
NASA hacker Gary McKinnon loses extradition appeal. Read more

www.vnunet.com:
Spammers hack legit sites to push meds. Read more

www.vnunet.com:
Exploit code surfaces for CA vulnerability. Read more

www.computerworld.com:
Blogger posts Windows Vista SP1 fixes on Web site. Read more

news.com.com:
Microsoft targets more software pirates. Read more

www.theregister.co.uk:
Spam: it sucks like a tarpit. Read more

blog.wired.com:
Google Rebuilds New Orleans Overnight. Read more

02 April 2007

Guides, Papers, etc
blogs.securiteam.com:
Another 3rd party patch for the Windows ANI vulnerability. Read more

blogs.securiteam.com:
ZERT�s latest patch - Science or Art? Read more

blogs.securiteam.com:
ZERT Patches ANI 0day. Read more

blogs.securiteam.com:
Putting Cross Site Scripting to Good Use. Read more

www.f-secure.com:
ANI worm. Read more

www.websense.com:
Informational Alert: ANI Zero-Day Update. Read more

www.avertlabs.com:
McAfee Avert Labs to Host Month of Bug Bugs (MoBB). Read more

www.symantec.com:
This is no April Fool�s Day joke. Read more

www.sophos.com:
Old-timers top malware chart but web-based threats pose greater problems. Read more

blog.assarbad.net:
Are the conclusions drawn from observation of Redpill results wrong? Read more

www.eweek.com:
Better Hope That the ANI Attacks Pass over Your Computer. Read more

www.mytelus.com:
Botnets: The end of the Web as we know it? Read more

www.reghardware.co.uk:
Ten Reasons why you should upgrade to Windows Vista. Read more

www.computerworld.com:
Cracking Google's 'secret sauce' algorithm. Read more

 

Vulnerabilities & Exploits
securitytracker.com:
HP Mercury Quality Center ActiveX Control Lets Remote Users Execute Arbitrary Code. Read more

 

News
blogs.technet.com:
Latest on security update for Microsoft Security Advisory 935423. Read more

computerworld.co.nz:
Exploit-for-sale hacker pins bug on Vista�s email app. Read more

searchsecurity.techtarget.com:
Cyberwar: A threat to business. Read more

www.orlandosentinel.com:
Selling on Internet? Beware of check scams. Read more

www.stevenspointjournal.com:
Criminal database sought. Read more

www.reghardware.co.uk:
Research reveals mislaid microprocessor megahertz. Read more

money.cnn.com:
Death of the cell phone charger. Read more


Copyright� MegaSecurity.org