Microsoft confirms critical SQL Server vulnerability

Monday, December 22nd, 2008

Microsoft late Monday issued a pre-patch advisory confirming a remote code execution vulnerability affecting its SQL Server line. The vulnerability, publicly disclosed with exploit code more than two weeks ago, affects Microsoft SQL Server 2000, Microsoft SQL Server 2005, Microsoft SQL Server 2005 Express Edition, Microsoft SQL Server 2000 Desktop Engine ...

Researchers sound alarm about bug in free antivirus scanner

Monday, December 22nd, 2008

A bug in Trend Micro's free online virus scanning service can be used by hackers to hijack Windows PCs running Internet Explorer, security researchers warned. Attackers able to dupe users into visiting a malicious Web page could exploit a vulnerability in the custom ActiveX control that Trend Micro distributes to users ...

WP-DB-Backup Leaves Your Data Exposed on the Internet

Sunday, December 14th, 2008

Older versions of the popular Wordpress plugin WP-DP-Backup leaves the copy of your entire database in a public folder for all to see.  The databases were stored in wp-content/backup/ and a quick Google search today still returns many databases of sites, including some as recent as a few days ago: http://www.google.com/search?num=100&hl=en&suggon=0&safe=off&q=intitle%3A%22index+of+%2Fwp-content%2Fbackup%22&btnG=Search For ...

Google Chrome Puts Security in a Sandbox

Thursday, December 11th, 2008

The Google Chrome browser is no longer a beta, and has been outfitted with a coat of security armor Google hopes will both protect users and help Chrome compete with rival browsers. The toughest piece of that armor involves sandboxing. In Chrome, HTML rendering and JavaScript execution are isolated in their ...

Rootkit unearthed in network security software

Saturday, November 29th, 2008

Researchers have unearthed rootkit-like functionality in an enterprise security product. Network security software from a Chinese developer includes processes deliberately hidden from a user and, even worse, a hidden directory, Trend Micro reports. Files in the hidden directory could exist below the radar of antivirus scanners, potentially creating a stealthy hiding ...