Malware Analysis for Administrators

Saturday, March 8th, 2008

http://www.securityfocus.com/infocus/1780   1. Introduction The threat of malicious software can easily be considered as the greatest threat to Internet security. Earlier, viruses were, more or less, the only form of malware. Nowadays, the threat has grown to include network-aware worms, trojans, DDoS agents, IRC Controlled bots, spyware, and so on. The infection vectors ...

New Trojan Mimics Skype, Steals Login Credentials

Saturday, March 8th, 2008

Security analysts are warning of another malicious software program masquerading as an installer file for Skype. The program sends the victim's Skype credentials, as well as any other logins or passwords stored in Internet Explorer, to another server, wrote Villu Arak, a Skype spokesman based in Tallinn, Estonia, on a Skype ...

Five of the Dirtiest Malware Tricks

Saturday, March 8th, 2008

If the crooks behind viruses, Trojan horses, and other malicious software were as stupid as they are scummy, we'd have a lot less to worry about. But as protective measures get better at stopping the obvious attacks, online creeps respond with underhanded moves to invade your PC. Here are five ...

Evil Javascript mutates to evade detection

Saturday, March 8th, 2008

Hackers have hit on a new technique for invading desktop computers via compromised websites, while avoiding anti-virus detectors, according to the SANS Institute. SANS' Internet Storm Center (ISC) said on Thursday it has come across the attack on a compromised website, where an iframe was used to deploy various pieces of ...

Malware Hunts Down and Deletes MP3s

Saturday, March 8th, 2008

Security experts have discovered a worm that might just be the recording industry's dream application: it hunts down and deletes MP3s on infected PCs. Security companies say the worm is only low risk, although its unusual payload could give a nasty surprise to an ardent music fan. The motivation of the ...