Hacker Launches Botnet Attack via P2P Software

Sunday, June 29th, 2008

A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."The defendant, Jason Michael Milmont, launched the assault ...

Zero-day flaw haunts Internet Explorer

Thursday, June 26th, 2008

An unpatched cross-domain vulnerability in Microsoft’s flagship Internet Explorer browser could expose Windows users to cookie hijacks and credentials theft attacks, according to a warning from security researchers. The zero-day flaw, which has been reported to Microsoft, is a variation of Eduardo Vela’s IE Ghost Busters talk: Do you believe in ghosts? ...

New tools to block and eradicate SQL injection

Tuesday, June 24th, 2008

The MSRC released an advisory today that discusses the recent SQL injection attacks and announces three new tools to help identify and block these types of vulnerabilities. The advisory discusses the new tools, the purpose of each, and the way each complements the others. The goal of this blog post is ...

Adobe ships critical PDF Reader, Acrobat patch

Tuesday, June 24th, 2008

Adobe has shipped a critical update to patch a code execution vulnerability affecting multiple versions of its Reader and Acrobat products. According to Adobe’s advisory, the flaw “could potentially allow an attacker to take control of the affected system.” If you have Adobe Reader or Acrobat installed on your machine, this update ...

$1B Market for Meddling With DNS Poses Security Problem

Tuesday, June 24th, 2008

The interception of Internet traffic to snoop on phone calls or track surfers' behavior is a hot topic -- but what's keeping members of ICANN's Security and Stability Advisory Committee up at night is the interception of traffic to and from sites that don't even exist. They explained why in ...