McAfee Virus definitions has been updated to version 4166
Symantec has released a new virus definitions update for Norton Antivirus.
A new computer worm that attempts to ride on the coattails of the anthrax scare emerged Tuesday, but numerous errors on the part of the program's author seem to have scuttled any chance the worm has to spread.
The worm is technically known as VBS.VBSWG.AF, or more colloquially as Antrax. It was discovered in an e-mail with a subject line that misspelled the name of the deadly anthrax disease as Antrax. The e-mail body also contains a message written in Spanish.
Read more
The worm is technically known as VBS.VBSWG.AF, or more colloquially as Antrax. It was discovered in an e-mail with a subject line that misspelled the name of the deadly anthrax disease as Antrax. The e-mail body also contains a message written in Spanish.
Read more
MooSoft has posted a new trojan definitions update for The Cleaner
Thanks CestLaVie for this one:
In TechRepublic discussions about the virtues of Linux vs. Windows, Linux enthusiasts love to point out that their OS is much more secure. They complain that Windows and its applications are full of bugs and poorly written code and that Windows is more susceptible to viruses.
Read more
In TechRepublic discussions about the virtues of Linux vs. Windows, Linux enthusiasts love to point out that their OS is much more secure. They complain that Windows and its applications are full of bugs and poorly written code and that Windows is more susceptible to viruses.
Read more
McAfee Virus definitions has been updated to version 4165
Symantec has released a new virus definitions update for Norton Antivirus.
Thanks CestLaVie. Zone Labs Inc., a leading creator of Internet security solutions, announced new versions, ZoneAlarm Pro 3.0 and ZoneAlarm 3.0, of its award-winning Internet security products. Both new versions of the personal firewall products include improvements to the user experience as a result of a redesigned and more intuitive look and feel as well as even stronger security. ZoneAlarm Pro also features powerful online privacy protection, including ad blocking and cookie control capabilities and enhanced support for local area networks, including wireless networks.
More than 15 million Internet users trust Zone Labs to protect their Internet-connected PCs from hacker attacks and other Internet-borne threats, said Gregor Freund, CEO and co-founder of Zone Labs. We are proud that so many people trust Zone Labs technology and we are committed to continuous product improvements so our customers can stay one step ahead of the ever-evolving threats found on the Internet. Adding Internet privacy features to ZoneAlarm Pro 3.0 demonstrates this ever-increasing level of support for our customers.
Read more
More than 15 million Internet users trust Zone Labs to protect their Internet-connected PCs from hacker attacks and other Internet-borne threats, said Gregor Freund, CEO and co-founder of Zone Labs. We are proud that so many people trust Zone Labs technology and we are committed to continuous product improvements so our customers can stay one step ahead of the ever-evolving threats found on the Internet. Adding Internet privacy features to ZoneAlarm Pro 3.0 demonstrates this ever-increasing level of support for our customers.
Read more
Thanks Jeffrey for this one:
Symantec Corp. [NASDAQ:SYMC] has confirmed that older versions of its technology for updating users' software could be exploited by attackers to deploy malware, or software capable of performing malicious acts.
In a bulletin published last week, Symantec characterized the security vulnerability in its LiveUpdate version 1.4 software as a medium risk.
Read more
Symantec Corp. [NASDAQ:SYMC] has confirmed that older versions of its technology for updating users' software could be exploited by attackers to deploy malware, or software capable of performing malicious acts.
In a bulletin published last week, Symantec characterized the security vulnerability in its LiveUpdate version 1.4 software as a medium risk.
Read more
This patch eliminates three vulnerabilities affecting Internet Explorer. The first involves how IE handles URLs that include dotless IP addresses. If a web site were specified using a dotless IP format (e.g., http://031713501415 rather than http://207.46.131.13), and the request were malformed in a particular way, IE would not recognize that the site was an Internet site. Instead, it would treat the site as an intranet site, and open pages on the site in the Intranet Zone rather than the correct zone. This would allow the site to run with fewer security restrictions than appropriate. This vulnerability does not affect IE 6.
The second involves how IE handles URLs that specify third-party sites. By encoding an URL in a particular way, it would be possible for an attacker to include HTTP requests that would be sent to the site as soon as a connection had been established. These requests would appear to have originated from the user. In most cases, this would only allow the attacker to send the user to a site and request a page on it. However, if exploited against a web-based service (e.g., a web-based mail service), it could be possible for the attacker to take action on the user's behalf, including sending a request to delete data.
The third is a new variant of a vulnerability discussed in Microsoft Security Bulletin MS01-015, affecting how Telnet sessions are invoked via IE. By design, telnet sessions can be launched via IE. However, a vulnerability exists because when doing so, IE will start Telnet using any command-line options the web site specifies. This only becomes a concern when using the version of the Telnet client that installs as part of Services for Unix (SFU) 2.0 on Windows NT(r) 4.0 or Windows(r) 2000 machines. The version of the Telnet client in SFU 2.0 provides an option for creating a verbatim transcript of a Telnet session. An attacker could start a session using the logging option, then stream an executable file onto the user's system in a location that would cause it to be executed automatically the next time the user booted the machine. The flaw does not lie in the Telnet client, but in IE, which should not allow Telnet to be started remotely with command-line arguments.
Read more
The second involves how IE handles URLs that specify third-party sites. By encoding an URL in a particular way, it would be possible for an attacker to include HTTP requests that would be sent to the site as soon as a connection had been established. These requests would appear to have originated from the user. In most cases, this would only allow the attacker to send the user to a site and request a page on it. However, if exploited against a web-based service (e.g., a web-based mail service), it could be possible for the attacker to take action on the user's behalf, including sending a request to delete data.
The third is a new variant of a vulnerability discussed in Microsoft Security Bulletin MS01-015, affecting how Telnet sessions are invoked via IE. By design, telnet sessions can be launched via IE. However, a vulnerability exists because when doing so, IE will start Telnet using any command-line options the web site specifies. This only becomes a concern when using the version of the Telnet client that installs as part of Services for Unix (SFU) 2.0 on Windows NT(r) 4.0 or Windows(r) 2000 machines. The version of the Telnet client in SFU 2.0 provides an option for creating a verbatim transcript of a Telnet session. An attacker could start a session using the logging option, then stream an executable file onto the user's system in a location that would cause it to be executed automatically the next time the user booted the machine. The flaw does not lie in the Telnet client, but in IE, which should not allow Telnet to be started remotely with command-line arguments.
Read more
MooSoft has posted another trojan definitions update
Thanks Mark for this one:
The aim of the Microsoft Security Tool Kit is to help customers protect their systems from common and dangerous threats that they are likely to encounter on the Internet. The Security Tool Kit includes tools that provide a baseline level of security for servers that are connected to the Internet. It also includes security patches for vulnerabilities that the Microsoft Security Response Center has determined to be of potentially high severity for systems that are connected to the Internet.
Read more
The aim of the Microsoft Security Tool Kit is to help customers protect their systems from common and dangerous threats that they are likely to encounter on the Internet. The Security Tool Kit includes tools that provide a baseline level of security for servers that are connected to the Internet. It also includes security patches for vulnerabilities that the Microsoft Security Response Center has determined to be of potentially high severity for systems that are connected to the Internet.
Read more
Symantec has released a new virus definitions update for Norton Antivirus.
Excel and PowerPoint have a macro security framework that controls the execution of macros and prevents macros from running automatically. Under this framework, any time a user opens a document the document is scanned for the presence of macros. If a document contains macros, the user is notified and asked if he wants to run the macros or the macros are disabled entirely, depending on the security setting. A flaw exists in the way macros are detected that can allow a malicious user to bypass macro checking.
A malicious attacker could attempt to exploit this vulnerability by crafting a specially formed Excel or PowerPoint document with macro code that would run automatically when the user opened it. The attacker could carry out this attack by hosting the malicious file on a web site, a file share, or by sending it through email.
Read more
A malicious attacker could attempt to exploit this vulnerability by crafting a specially formed Excel or PowerPoint document with macro code that would run automatically when the user opened it. The attacker could carry out this attack by hosting the malicious file on a web site, a file share, or by sending it through email.
Read more
McAfee Virus definitions has been updated to version 4164
The SANS Institute has updated their Twenty Most Critical Internet Security Vulnerabilities list. Thanks CestLaVie.
An e-mail message claiming to come from the SecurityFocus ARIS Analyst Team and TrendMicro is being used to deliver what appears to be a Trojan horse to unsuspecting users.
Do not run this attachment. These messages do not come from TrendMicro or SecurityFocus, as a quick check of the headers will reveal.
Read more
Do not run this attachment. These messages do not come from TrendMicro or SecurityFocus, as a quick check of the headers will reveal.
Read more
McAfee Virus definitions has been updated to version 4163