Excel 0-Day Exploited

Tuesday, February 24th, 2009

Symantec is reporting that Trojan.Mdropper.AC is exploiting an unpatched vulnerability in Excel 2007. Earlier versions of Excel may also be vulnerable. The vulnerability is described as a "Boundary Condition Error" and can result in remote code execution, but that's it for details for now. The research is obviously in its early ...

eBay auction tool website infected with malware

Monday, February 23rd, 2009

A Trojan horse lurking on servers belonging to Auctiva.com, a Web site offering eBay auction tools, infected people's PCs last week. The problem became very public when Google's malware warning system kicked in as people tried to browse the site, saying Auctiva was infected with malware. Google will display an interstitial ...

Fast-Track 4.0 – Automated Penetration Testing Suite

Wednesday, February 18th, 2009

For those of you new to Fast-Track, Fast-Track is a python based open-source project aimed at helping Penetration Testers in an effort to identify, exploit, and further penetrate a network. Fast-Track was originally conceived when David Kennedy was on a penetration test and found that there was generally a lack ...

Telnetd exploit on FreeBSD 7

Monday, February 16th, 2009

A posting on the Full Disclosure mailing list has revealed what the FreeBSD Security team call a semi-remote root exploit for the telnetd service in FreeBSD 7, and later. By default, this service is disabled. To exploit the vulnerability, a maliciously crafted library must be placed on the victim system beforehand, ...

How Attackers Use Your Metadata Against You

Saturday, February 14th, 2009

To steal your identity, a cybercriminal doesn't have to have direct access to your bank account or other personal information. Often, he collects information about you from a variety of seemingly innocuous sources, then uses that data to map out a strategy to crack your online defenses and drain your ...