Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Microsoft is All About Malware, Apple is Spyware

  • Subject: [News] [Rival] Microsoft is All About Malware, Apple is Spyware
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Fri, 25 Jun 2010 15:32:54 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.4.2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Malware: certified trustworthy - Update

,----[ Quote ]
| Virus Teaser According to anti-virus vendor F-
| Secure, the number of digitally signed malware 
| samples for Windows is increasing - and more 
| and more scareware programs also include a 
| valid digital signature. Virus authors use 
| this method to overcome various hurdles on 
| Windows systems and suppress alerts such as 
| those triggered when a program attempts to 
| install an ActiveX control in Internet 
| Explorer, or before installing a driver. F-
| Secure's list of potentially undesirable 
| programs contains almost 400,000 digitally 
| signed samples. In terms of malware, the list 
| still includes almost 24,000 samples.
`----

http://www.h-online.com/security/news/item/Malware-certified-trustworthy-Update-1027066.html

Privacy Change: Apple Knows Where Your Phone Is And Is Telling People

,----[ Quote ]
| Apple updated its privacy policy today, with 
| an important, and dare we say creepy new 
| paragraph about location information. If you 
| agree to the changes, (which you must do in 
| order to download anything via the iTunes 
| store) you agree to let Apple collect store 
| and share "precise location data, including 
| the real-time geographic location of your 
| Apple computer or device."
`----

http://consumerist.com/2010/06/privacy-change-apple-knows-your-phone-is-and-is-telling-people.html


Related:

Drive-by war-dialling TIFF shocker:

,----[ Quote ]
|    Moore posted to the site an exploit that would allow a hacker to
| insert malicious code onto someone's iPhone to access the device's
| data. Because the flawed TIFF library is used by the iPhone's Web
| browser, e-mail program, and iTunes software -- and because all of
| those programs run as root processes -- one of the iPhone's
| undocumented "features" is a gaping security hole.
|
|    Unlike the unlocking hackers, Moore said, "I wanted an exploit
| that would write any arbitrary payload" to the phone. "This exploit
| is rock solid. It's very reliable," he said. "You can send it in an
| e-mail, you can embed it in a Web page."
|
|    Susceptible to Drive-By attacks
`----

http://www.toptechnews.com/story.xhtml?story_id=56074
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkwkvhYACgkQU4xAY3RXLo5edgCfY/Lu3OVpXYWAzFjf2ng+u58m
qUQAn3rgJ4/R1qToyjvjFFOE6ETnJ2ZW
=3kdb
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index