[img_assist|nid=4368|title=|desc=|link=none|align=right|width=82|height=111]In a sudden about-face, Sun has rushed out a Java update to fix a drive-by download vulnerability that exposed Windows users to in-the-wild malware attacks.The patch comes less than a week after Sun told a Google researcher it did not consider the issue serious enough to warrant an out-of-cycle patch and less than a day after researchers spotted live exploits on a booby-trapped song lyrics Web site.
Browsing Tag: malware
A computer security researcher has released a plugin for Firefox that provides a wealth of data on Web sites that may have been compromised with malicious code. The plugin, called Fireshark, was released at the Black Hat Europe conference. Read the full article. [IDG News Service]
[img_assist|nid=4352|title=|desc=|link=none|align=right|width=100|height=100]Security researchers have discovered flaws in common file formats,
including .zip, which can be used to sneak malware onto computers by
evading antivirus detection and will present their findings at Blackhat Europe. Read the full article. [CNet]
[img_assist|nid=4354|title=|desc=|link=none|align=right|width=100|height=100]New research from Google underscores the breadth of fake antivirus operations on the Web. An analysis of 240 million Web pages collected by Google’s malware detection infrastructure over a 13-month period discovered more than 11,000 domains involved in the distribution of rogue antivirus (AV). Read the full article. [eWEEK]
Malware authors have developed a new, and frighteningly effective, tactic that uses a feature built into all of the modern browsers to redirect users to malicious sites without their knowledge or action.
[img_assist|nid=4290|title=|desc=|link=none|align=left|width=100|height=100]Security researchers have identified a newly formed botnet that comprises machines infected with a Trojan specifically designed to manage the downloading and installation of a spectrum of other malicious software.
[img_assist|nid=4265|title=|desc=|link=none|align=right|width=100|height=100]Malicious hackers have found a way to hijack WordPress database credentials and use that information to redirect thousands of blogs to Web sites laden with malware.The attacks, which started last Friday, occurred mostly on WordPress blogs hosted by Network Solutions but it appears that there are multiple security weaknesses in play.
[img_assist|nid=4217|title=|desc=|link=none|align=right|width=100|height=100]A proposal to let Internet service providers conceal the contact
information for their business customers is drawing fire from a number
of experts in the security community, who say the change will make it
harder to mitigate the threat from spam and malicious software. Read the full article. [KrebsonSecurity]
The attackers behind the raft of banker Trojans emanating from Brazil these days are continuing to refine their craft and learn new tricks. Their latest efforts have seen them going to greater lengths than ever to obfuscate their creations and hide their true functionality in order to evade detection and analysis by security software.
[img_assist|nid=4142|title=|desc=|link=none|align=right|width=100|height=100]Upscale grocery conglomerate Whole Foods Market said it is
continuing to clamp down on a series of Facebook-based scams that
entice users with a purported $500 gift card from the Austin,
Texas-based supermarket chain. Read the full article. [CNet]