Browsing Tag: malware

[img_assist|nid=3556|title=|desc=|link=none|align=left|width=100|height=100]Crooks have developed a man-in-the-middle-attack designed to circumvent authentication kit used by dedicated World of Warcraft gamers. The ruse relies on tricking gamers into installing Trojans disguised
as gaming ad-ons. Once applied the malware allows hackers to capture
and relay authentication commands next time a victim logs on to
Blizzard’s servers. Read the full article. [The Register]

Read more...

Microsoft has warned Windows users to be on their guard against a piece of rogue antivirus software passing itself off as Microsoft Security Essentials. Security Essentials 2010 is a piece of software Microsoft said installs a fake virus scanner on your machine and]monitors and blocks processes it doesn’t like. Read the full article . [The Register]

Read more...

Categories: Web Security

[img_assist|nid=3445|title=|desc=|link=none|align=left|width=100|height=100]SQL injection has become perhaps the most widely used technique for compromising Web applications, thanks to both its relative simplicity and high success rate. It’s not often that outsiders get a look at the way these attacks work, but a well-known researcher is providing just that.

Read more...

[img_assist|nid=3371|title=|desc=|link=none|align=right|width=100|height=100] Twitter users were being hit on Wednesday with what seems to be the
second phishing attack this week, according to researchers. The latest attack features a message that says “This you????” followed by a link that leads to a fake Twitter log-in page. Read the full article. [cnet]

Read more...

[img_assist|nid=3380|title=|desc=|link=none|align=left|width=100|height=100]Researchers are preparing to release a free tool to stop
“drive-by” downloads: Internet attacks in which the mere act of
visiting a Web site results in the surreptitious installation of
malicious software. The new tool, called BLADE (Block All Drive-By
Download Exploits), stops downloads that are initiated without the
user’s consent. Read the full article. [Technology Review]

Read more...