A Look at a Bank Worm

Wednesday, April 23rd, 2008

Malware authors will often have their files display something to the user so that they actually believe the file is legitimate. Many of us have experienced such tricks, including fake errors stating that a specific file could not be found or that the application failed to load properly. Today we ...

Hacker releases working GDI-bug attack code

Wednesday, April 16th, 2008

Security researchers on Monday spotted malicious code that triggers a critical vulnerability in the Chinese version of Windows 2000, and warned users of other editions to expect attacks. Symantec confirmed that the proof-of-concept code publicly posted to the milw0rm.com site earlier in the day successfully attacks Chinese editions of Windows 2000 ...

ISPs accused of tampering with web pages

Wednesday, April 16th, 2008

About one percent of the Internet web pages are being changed in transit, sometimes in a harmful way, according to researchers at the University of Washington. In a paper, set to be delivered Wednesday, the researchers document some troubling practices. In July and August they tested data sent to about 50,000 ...

Crafted EXE files can inject code in ClamAV

Monday, April 14th, 2008

Security service provider Secunia has discovered a vulnerability in the ClamAV open source virus scanner. Attackers can foist code on the appliction using manipulated EXE files. According a Secunia advisory, a boundary error in the cli_scanpe() function in libclamav/pe.c can cause a heap-based buffer overflow. Manipulated PE executables (Windows .exe files) ...

Bot breaks Hotmail’s CAPTCHA in 6 seconds

Monday, April 14th, 2008

A new bot can crack defenses erected by Microsoft to keep spammers from creating large numbers of accounts on its Live Hotmail service within seconds, a security researcher said Friday. Dan Hubbard, vice president of security research at Websense, said the bot broke Live Hotmail's CAPTCHA (Completely Automated Public Turing Test ...