-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Internet HoneyGrid reveals 95% of User Generated Content is spam or malicious
,----[ Quote ]
| Covering the last six months of 2009, the
| report is based upon the findings of the
| ThreatSeeker Network which is used to
| discover, classify and monitor global
| Internet threats and trends courtesy of
| something called the Internet HoneyGrid.
| This comprises of honeyclients and
| honeypots, reputation systems and advanced
| grid computing systems, all of which
| combine to parse through one billion pieces
| of content every day while searching for
| security threats. Every single hour the
| Internet HoneyGrid scans some 40 million
| websites for malicious code as well as 10
| million emails for unwanted content and
| malicious code.
`----
http://www.daniweb.com/news/story258407.html
Researcher to Reveal More Internet Explorer Problems
,----[ Quote ]
| Microsoft's Internet Explorer could
| inadvertently allow a hacker to read files
| on a person's computer, another problem for
| the company just days after a serious
| vulnerability received an emergency patch.
`----
http://www.pcworld.com/article/187617/researcher_to_reveal_more_internet_explorer_problems.html
Microsoft Internet Explorer Still Has A Few Holes Says Security Outfit
http://www.itproportal.com/security/news/article/2010/1/26/microsoft-internet-explorer-still-has-few-holes-says-security-outfit/
Microsoft warns that IE zero-day vulnerability causes data leakage
,----[ Quote ]
| Microsoft issued a new advisory late
| Wednesday, warning Internet Explorer (IE)
| users of the potential for data leakage as
| a result of new publicly disclosed IE zero-
| day vulnerabilities.
`----
http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1380683,00.html
Microsoft were aware of Aurora security flaws
,----[ Quote ]
| In a blog posting by Jerry Bryant, a
| Microsoft security programme manager, "when
| the attack discussed in Security Advisory
| 979352 was first brought to our attention
| on Jan 11, we quickly released an advisory
| for customers three days later."
|
| "As part of that investigation, we also
| determined that the vulnerability was the
| same as a vulnerability responsibly
| reported to us and confirmed in early
| September."
`----
http://www.infosecurity-magazine.com/view/6797/microsoft-were-aware-of-aurora-security-flaws-/
Has Microsoft shot itself in the foot with Security Essentials?
http://www.pcpro.co.uk/realworld/355291/has-microsoft-shot-itself-in-the-foot-with-security-essentials
Expert finds vulnerabilities in Microsoft browser
http://www.montrealgazette.com/business/fp/Expert+finds+vulnerabilities+Microsoft+browser/2474379/story.html
Internet Explorer Bug Can Disclose Local Files
http://www.pcmag.com/article2/0,2817,2358788,00.asp
New attack against IE could expose all PC files
,----[ Quote ]
| Microsoft's popular Internet Explorer web
| browser suffers from several minor flaws,
| which, when combined, can allow an attacker
| to read all the files on a user's computer,
| according to researchers at penetration
| testing vendor Core Security Technologies.
`----
http://www.scmagazineus.com/new-attack-against-ie-could-expose-all-pc-files/article/162466/
Fake Microsoft Outlook Update Installs Trojan
,----[ Quote ]
| A malicious spam campaign caught by Panda
| Labs is using a fake Microsoft Update
| notice to trick victims into installing a
| Trojan. While well crafted, the attack
| still provides dead giveaways.
`----
http://www.pcworld.com/article/188456/fake_microsoft_outlook_update_installs_trojan.html
Recent:
Microsoft has another IE flaw
,----[ Quote ]
| CURSED BY ITS HAIRBALL CODE, Microsoft has
| released another security warning relating to
| a bug in Internet Explorer.
`----
http://www.theinquirer.net/inquirer/news/1590449/microsoft-ie-flaw
Related:
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
New Zealand teenager convicted over international cyber crime ring
,----[ Quote ]
| Owen Thor Walker, 18, known by his online name "AKILL," was involved in a
| network accused of infiltrating 1.3 million computers and skimming millions
| of dollars from victims' bank accounts.
`----
http://news.smh.com.au/new-zealand-teenager-convicted-over-international-cyber-crime-ring/20080301-1vzs.html
No April Fools'--Storm worm is back
,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall
| using the netsh firewall set command, makes a lot of outbound connections,
| then listens on a random UDP port.
`----
http://www.news.com/8301-10789_3-9906880-57.html?part=rss&subj=news&tag=2547-1_3-0-20
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAktv97kACgkQU4xAY3RXLo5kuACgomzacC6jWe8m8dcEnqp8Ykod
JZQAoIbebX5AJX2izD5fPZ0zh0Kpgi9c
=8p+Y
-----END PGP SIGNATURE-----
|
|