Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Microsoft Software So Insecure That "Emergency" Patch Arrives

  • Subject: [News] [Rival] Microsoft Software So Insecure That "Emergency" Patch Arrives
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Thu, 01 Apr 2010 12:25:50 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Microsoft issues emergency patch for 10 IE holes

,----[ Quote ]
| Microsoft issued an emergency security 
| update on Tuesday to plug 10 holes in 
| Internet Explorer, including a critical 
| vulnerability that has been exploited in 
| attacks in the wild.
| 
| The cumulative update, which Microsoft 
| announced on Monday, resolves nine 
| privately reported flaws and one that was 
| publicly disclosed. The most severe 
| vulnerabilities could lead to remote code 
| execution and a complete takeover of the 
| computer if a user were to view a malicious 
| Web site using IE, Microsoft said in the 
| bulletin summary. 
`----

http://news.cnet.com/8301-27080_3-20001428-245.html

Microsoft patches a gaping security hole

,----[ Quote ]
| SOFTWARE INSECURITY SISYPHUS Microsoft has 
| released an out-of-cycle patch for users 
| lazy or ignorant enough to still be using 
| an old version of Internet Explorer.
| 
| It's generally rare that threats are deemed 
| serious enough for Microsoft to not wait 
| until its next Patch Tuesday, which would 
| be April 13th now, but a vulnerability hit 
| Internet Explorer 6 and 7 that left them 
| open to potential remote code execution.
`----

http://www.theinquirer.net/inquirer/news/1598921/microsoft-patches-gaping-security-hole

Botnet pierces Microsoft Live through audio captchas

,----[ Quote ]
| The prolific Pushdo spam botnet has found a 
| new way to penetrate Microsoft's Live.com 
| by exploiting weaknesses in the audio 
| captchas designed to prevent automated 
| scripts from accessing the popular email 
| service.
| 
| A new version of the bot causes infected 
| PCs to pull down Live.com audio captchas 
| and return the correct response within 10 
| seconds, according to a researcher at anti-
| virus firm Webroot. The attack allows the 
| zombie machines to send email through 
| accounts with a Live.com address, which are 
| whitelisted by many spam filters. The 
| technique offers spammers an alternative to 
| sending spam through open mail relays, 
| which are often blacklisted.
`----

http://www.theregister.co.uk/2010/03/22/microsoft_live_captcha_bypass/

MS coughs to Hotmail block

,----[ Quote ]
| Microsoft has apologised to its UK Hotmail 
| users after some of the software vendor's 
| IP addresses were embarrassingly blocked 
| due to spamming.
| 
| "Microsoft is dedicated to providing the 
| most trusted and protected consumer 
| experience on the web," said a Redmond 
| spokesman.
`----

http://www.theregister.co.uk/2010/03/29/microsoft_hotmail_spamming_ip_addresses/

Beware Botnet's Return, Security Firms Warn

,----[ Quote ]
| Why Rustock has adopted this technique is 
| open to debate. Adding TLS to outbound spam 
| slows the rate at which spam can be 
| delivered, which would seem to hurt the 
| spammer's intention to spread non-
| legitimate email as far and fast as 
| possible. It is also the case that TLS-
| encrypted email is no longer automatically 
| trusted by receiving servers, so it is 
| unlikely to be a simple evasion technique.
`----

http://www.pcworld.com/article/192668/beware_botnets_return_security_firms_warn.html

Unfashionable DDoS attacks still menace websites

,----[ Quote ]
| Internet security research firm Team Cymru 
| has begun publishing a four part series 
| explaining the hows and whys of denial of 
| service attacks.
`----

http://www.theregister.co.uk/2010/03/23/ddos_essentials/

Trojan poses as Adobe update utility

,----[ Quote ]
| Duc explains: "From analysis, we found that 
| malware is written in Visual Basic, faking 
| such popular programs as Adobe, DeepFreeze, 
| Java, Windows, etc. In addition, on being 
| executed, they immediately turn on the 
| following services: DHCP client, DNS 
| client, Network share and open port to 
| receive hackerâs commands."
`----

http://www.theregister.co.uk/2010/03/29/software_update_trojan/

New Malware Overwrites Software Updaters

,----[ Quote ]
| For the first time security researchers 
| have spotted a type of malicious software 
| that overwrites update functions for other 
| applications, which could pose additional 
| long-term risks for users.
| 
| The malware, which infects Windows 
| computers, masks itself as an updater for 
| Adobe Systems' products and other software 
| such as Java, wrote Nguyen Cong Cuong, an 
| analyst with Bach Khoa Internetwork 
| Security (BKIS), a Vietnamese security 
| company, on its blog.
`----

http://www.pcworld.com/article/192422/new_malware_overwrites_software_updaters.html?tk=rss_news
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAku0gr4ACgkQU4xAY3RXLo6a1gCgsRnudq0VC0i954uIgA+3Ycil
e+cAn3BdilB5ebPHBrF00Vpao3iN31NI
=6mgS
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index