Browsing Tag: malware

Categories: Vulnerabilities

[img_assist|nid=4368|title=|desc=|link=none|align=right|width=82|height=111]In a sudden about-face, Sun has rushed out a Java update to fix a drive-by download vulnerability that exposed Windows users to in-the-wild malware attacks.The patch comes less than a week after Sun told a Google researcher it did not consider the issue serious enough to warrant an out-of-cycle patch and less than a day after researchers spotted live exploits on a booby-trapped song lyrics Web site.

Read more...

[img_assist|nid=4354|title=|desc=|link=none|align=right|width=100|height=100]New research from Google underscores the breadth of fake antivirus operations on the Web. An analysis of 240 million Web pages collected by Google’s malware detection infrastructure over a 13-month period discovered more than 11,000 domains involved in the distribution of rogue antivirus (AV). Read the full article. [eWEEK]

Read more...

Categories: Malware

[img_assist|nid=4290|title=|desc=|link=none|align=left|width=100|height=100]Security researchers have identified a newly formed botnet that comprises machines infected with a Trojan specifically designed to manage the downloading and installation of a spectrum of other malicious software.

Read more...

[img_assist|nid=4265|title=|desc=|link=none|align=right|width=100|height=100]Malicious hackers have found a way to hijack WordPress database credentials and use that information to redirect thousands of blogs to Web sites laden with malware.The attacks, which started last Friday, occurred mostly on WordPress blogs hosted by Network Solutions but it appears that there are multiple security weaknesses in play.

Read more...

[img_assist|nid=4217|title=|desc=|link=none|align=right|width=100|height=100]A proposal to let Internet service providers conceal the contact
information for their business customers is drawing fire from a number
of experts in the security community, who say the change will make it
harder to mitigate the threat from spam and malicious software. Read the full article. [KrebsonSecurity]

Read more...