Ben Edelman published today an article about ComScore by describing “multiple recent ComScore RelevantKnowledge installations that occur without user consent.”
He provided video proof of one such installation.
Read the article at http://www.benedelman.org/news/062907-1.html
“A stealthy and potentially dangerous bug has been discovered in security products from eight different vendors, including Check Point Software, according to an article in Dark Reading. The so-called cross-site request forgery (CSRF) lets an attacker access the user’s network and even conduct transactions on behalf of the user. It could affect over a million installations, but so far, Check Point is the only security vendor to step up and patch it. This vulnerability is found in most everything with a Web-based interface, including printers, firewalls, DSL routers, and IP phones.”
Four well-known researchers challenged rootkit guru Joanna Rutkowska on Thursday to prove that a rootkit can be made undetectable.
The four researchers — independent Dino Dai Zovi, Peter Ferrie of Symantec, Nate Lawson of Root Labs (corrected) and Thomas Ptacek of Matasano — stated that any rootkit that runs on the host of a virtual environment, leaves so many telltale signs that it can be detected.
More at http://www.securityfocus.com/brief/537
Also: Researchers: ‘Blue Pill’ Rootkit Detectable
Joanna Rutkowska, the security researcher who one year ago built a working prototype, code-named Blue Pill, of a rootkit capable of creating malware that remains “100 percent undetectable,” has tacitly conceded to a group of security researchers that the detector code they cooked up in the past month will in fact ferret out Blue Pill—at this point in its development, at any rate.
Tom Ptacek, security researcher and founder of New York-based Matasano Security, posted a note on June 27 saying that he, along with his fellow security researchers who had worked on hypervisor rootkit detection, were inviting Rutkowska to a challenge at Black Hat Briefings in Las Vegas sometime on Aug. 1 or 2.
Panda Software has launched the mini, customisable version of NanoScan, the instant virus scanner from Panda Software, designed to detect active malware on a PC in less than one minute. NanoScan is available at: http://www.infectedornot.com
“With this launch, Panda Software is contributing to the rapidly expanding Web 2.0 user community,” says Jeremy Matthews, MD of Panda Software SA. “Portals such as iGoogle, Windows Live, NetVibes or Protopage, already have custom versions of NanoScan, where visitors can benefit from the speed and detection capacity of NanoScan.”
The above link contains an article that lists the error codes for Microsoft Windows Update Version 6. These error codes are useful when you view the %systemroot%windowsupdate.log file.
he United States Department of Justice has released information warning the public of a recent surge in fraudulent spam e-mail messages claiming to be from the DOJ. The messages contain a malicious attachment that supposedly contains information regarding complaints filed against them with the DOJ and IRS, but instead launches malware on the user’s system when opened.
More information regarding these messages can be found in the DOJ Justice Department Alerts Public about Fraudulent Spam Email Press Release.
Pretending again to be from trusted entity – email@example.com with infected attachment as signature.zip.
“When visited, the web page in question (a game site related to RuneScape) shows couple of broken icons and all links just point to another web page that conveniently inform the user that his version of Macromedia Flash Player needs to be updated. After this notice, the user is redirected to a web site hosting a complete replica of the Shockwave Player Download Center”