Web Users in Malware Crosshairs

Wednesday, April 9th, 2008

Online malware attacks are becoming more pervasive, targeted, and refined as the underground threat economy continues to evolve and take on the characteristics of an organized industry. The latest iteration of Symantec's Internet Security Threat Report -- covering its research over the final six months of calendar 2007 and released on ...

New attack kit targets bag of ActiveX bugs

Monday, April 7th, 2008

Hackers are using a new multiple-attack package composed of seven ActiveX exploits, many of them never seen in the wild before, said a security company on Friday. Fewer than half of the flawed ActiveX controls have been patched. The attack framework probes Windows PCs for vulnerable ActiveX controls from software vendors Microsoft, ...

Kiosk Hacking: When there is nothing else left

Monday, April 7th, 2008

In the tiger team operations we have been involved with, I often end up hacking through the least interesting systems. If you ask AP, a password-cracking ninja and master of hacking through simplicity, the less interesting the system is, the higher the chances to be insecure. A successful exploitation of ...

Before Patch Tuesday, There Were Malware

Monday, April 7th, 2008

Recycling an old social engineering technique and using two different attack methods, a new spam run emerges as a threat to Web users before Microsoft’s Patch Tuesday. And not because it exploits soon-to-be named vulnerabilities. What this spamming operation takes advantage of is the anticipation itself for the release of patches ...

Snort 2.8.1 Released

Thursday, April 3rd, 2008

New Additions Target-Based support to allow rules to use an attribute table describing services running on various hosts on the network. Eliminates reliance on port-based rules. Support for GRE encapsulation for both IPv4 & IPv6. Support for IP over IP tunneling for both IPv4 & IPv6. SSL preprocessor to allow ability to not inspect ...