Security researcher publishes exploit toolkit

Tuesday, July 29th, 2008

An Argentinian security researcher has published a security exploit toolkit targeting the update mechanisms of Java, Mac OS X, OpenOffice.org and other software, and relying on man-in-the-middle techniques such as those made possible by the recently disclosed DNS security hole. The toolkit, ISR-Evilgrade 1.0, was released by Francisco Amato, a researcher ...

Online Banking: Widespread Security Flaws Revealed

Tuesday, July 29th, 2008

Online bankers, beware. More than 75 percent of bank Web sites surveyed by a research team had at least one design flaw that could make customers vulnerable to cyber thieves.University of Michigan computer scientist Atul Prakash and his graduate students Laura Falk and Kevin Borders examined the Web sites of ...

Blogspot.com is number one host for malware

Tuesday, July 29th, 2008

New research by IT security and control firm Sophos has identified Blogger (www.blogspot.com) as the leading host for malware. The popular blogging service now accounts for 2 percent of all of the world's malware hosted on the web. Attacks on Blogger involve hackers either setting up malicious blogs on the service, ...

Malware In E-Mail As Fake Invoices And E-Tickets

Sunday, July 27th, 2008

McAfee is reporting new examples of malware distributed through e-mail in the form of UPS invoices and airline e-tickets. The threats seem to be variants of a new downloader the company had reported on (Generic Downloader.ab, MTIS08-131-A). The UPS version says that your last shipment could not be delivered because the address ...

Beware Fake Malware Cleaner Programs

Sunday, July 27th, 2008

Chinese hackers are sending out malware masquerading as the Trend Micro Virus Clean Tool, according to Trend. The example in the linked Trend blog is in Chinese, so perhaps the threat is only real in China (and Taiwan). But the example is instructive.The threat arrives as an e-mail which looks ...