Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Internet Explorer Unsafe Despite AV Software, Windows Zombies Attack

  • Subject: [News] [Rival] Internet Explorer Unsafe Despite AV Software, Windows Zombies Attack
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Tue, 30 Oct 2007 09:16:31 +0000
  • Newsgroups: comp.os.linux.advocacy
  • Organization: Netscape / schestowitz.com
  • User-agent: KNode/0.10.4
When AntiVirus Products (and Internet Explorer) Fail you

,----[ Quote ]
| When Didier Stevens recently took a closer look at some Internet Explorer 
| malware that he had found, something surprised him somwehat. He discovered 
| that the IE-targeted malware had been obfuscated with null-bytes (0x00) and 
| when run against VirusTotal, he found that fewer than half of the products 
| identified the sample as malware (15 of 32). When all null-bytes were 
| removed, the chances of successful detection improved, though not as much as 
| would normally be expected (25 of 32 detections).      
`----

http://www.beskerming.com/commentary/2007/10/29/296/When_AntiVirus_Products_(and_Internet_Explorer)_Fail_you

There are those who try to crack down on crime instead of fixing the source of
the issue (compromised PCs, including servers that distribute malware).

FTC: Let us fine spyware operations, already

,----[ Quote ]
| Federal consumer protection authorities say they want nothing more than to 
| put the financial hurt on deceptive spyware purveyors. The trouble, they say, 
| is that the law still doesn't let them.  
`----

http://www.news.com/8301-10784_3-9806565-7.html?part=rss&subj=news&tag=2547-1_3-0-20

Consumer revenge site returns after DDoS attack

,----[ Quote ]
| Lewis reckons the timing of the attack is "probably not a coincidence" . The 
| perpetrators of the attack remain unidentified. Sometimes such attacks are 
| motivated by blackmail but Lewis said it has received no approach from those 
| behind the assault.   
`----

http://www.theregister.co.uk/2007/10/29/moneysavingexpert_ddos/


Related:

The end of Windows, or a security expert gives up

,----[ Quote ]
| And then go and warn others to do the same. Windows is defeated - its days 
| are over. It carries the worm inside. So whatever will happen next: RIP, 
| Windows.  
`----

http://wolfgang.lonien.de/?p=456


Gathering 'Storm' Superworm Poses Grave Threat to PC Nets

,----[ Quote ]
| Although it's most commonly called a worm, Storm is really more: a worm, a 
| Trojan horse and a bot all rolled into one. It's also the most successful 
| example we have of a new breed of worm, and I've seen estimates that between 
| 1 million and 50 million computers have been infected worldwide.   
`----

http://www.wired.com/politics/security/commentary/securitymatters/2007/10/securitymatters_1004


Security expert: Storm botnet 'services' could be sold

,----[ Quote ]
| "This effectively allows the Storm author to segment the Storm botnet into 
| smaller networks," Stewart wrote in his blog post. "This could be a precursor 
| to selling Storm to other spammers, as an end-to-end spam botnet system, 
| complete with fast-flux DNS and hosting capabilities. If that's the case, we 
| might see a lot more of Storm in the future."    
`----

http://news.zdnet.com/2100-1009_22-6213781.html

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index