3rd party solutions to the Internet Explorer CreateTextRange vulnerability

Microsoft respond on the third party solutions to the Internet Explorer CreateTextRange vulnerability (see advisory) and they do not recommend using such. QUOTEWe’ve also been made aware of some third party solutions being made available for this vulnerability.Some of these solutions make modifications to Windows itself to bypass the attack vector of the vulnerability.  Of course, while the IE team is working on an update to address the problem, we certainly recommend a defense in depth strategy that involves third party tools such as AntiVirus or IDS/IPS solutions.  However we cannot recommend third party solutions that modify the way the product itself … Continue reading 3rd party solutions to the Internet Explorer CreateTextRange vulnerability

Sunbelt provided SpywareQuake Removal Instructions

In addition to self-help guide that we can find on respected forums here, Sunbelt Software, the maker of CounterSpy anti-spyware, published a SpywareQuake Removal instructions at http://www.sunbelt-software.com/spyware/SpywareQuakeRemoval.html via Calendar of Updates

Microsoft Security Advisory (917077) updated

March 28, 2006: Advisory updated with information regarding additional security software protections, current limited scope of attacks, and the status of the Internet Explorer security update. http://www.microsoft.com/technet/security/advisory/917077.mspx  

CastleCops and Sunbelt Software announced Phishing Incident Reporting and Termination (PIRT) Squad

This is great  — > CastleCops and Sunbelt Software announced today a new anti-phishing task force designed to help consumers and businesses combat the unending scourge of phishing scams and online identity theft.  It’s called “Phishing Incident Reporting and Termination (PIRT) Squad” See their press release here then read Sunbelt’s blog entry on the above.  The above is in news.com BTW, PIRT is recruiting handlers.  If you like to get involved, please do not hesitate to join by going to http://wiki.castlecops.com/PIRT

New Panda Software anti-rootkits technology in Titanium and Platinum 2006

The new versions of Titanium 2006 Antivirus + Antispyware and Platinum 2006 Internet Security include a new technology specifically designed to detect processes hidden in memory, a technique frequently used by rootkits All users of these Panda products will receive the free update of their software to include this technology Users of previous versions can update to the 2006 versions at: http://www.pandsoftware.com/renewals Panda Software

Anti-spyware principles adopted by Web Analytics Association

” The nonprofit Web Analytics Association announced Monday it has adopted an anti-spyware statement of principles that distinguishes legitimate Web analytics vendors that use browser cookies to measure Web site traffic from deceptive spyware software perpetrators. “Unethical spyware purveyors are giving honest Web analytics vendors a black eye,” said Ben Isaacson, privacy and compliance leader for CheetahMail, who has been among executives pushing the adoption of anti-spyware principles for the WAA. “ http://www.btobonline.com/article.cms?articleId=27483

IBM debuts intrusion-prevention tool (designed to monitor worm attacks)

The new feature, part of IBM’s On Demand Innovation Services, is Big Blue’s latest effort to capture a bigger slice of the IT security market. Last month, the company debuted its Identity Manager Express security software. IBM’s intrusion-detection tool aims to monitor worm attacks and reduce false positives, or instances in which legitimate actions are classified as malicious intrusions. Among its features, the tool presents dummy postings of server activity that are designed to lure attackers into scanning the servers. http://news.com.com/IBM+debuts+intrusion-prevention+tool/2100-7355_3-6054234.html

Israel jails spyware-for-hire couple

An Israeli couple were jailed on Monday after confessing to the development and sale of spyware that helped private investigators snoop on their clients’ business competitors. Investigators allege the duo developed and sold customised spyware or Trojan horse packages designed to evade detection by security tools to three private investigation companies in Israel – Modi’in Ezrahi, Zvi Krochmal, and Philosof-Balali. This spyware code was allegedly installed on victims’ PCs by private detectives from a diskette or via email, as part of a spying scam that ran for up to two years. http://www.theregister.co.uk/2006/03/27/israeli_spyware_duo_jailed/

3Com Calls for New Network Security Architecture

3Com has called on I.T. vendors to join it in creating an open network security architecture. Outlined at last month’s RSA Conference, the company believes its Intelligent Network Control architecture will help customers choose the best of breed access-, attack-, and application-control devices without having to rip out existing systems. The idea depends on companies publishing application programming interfaces (APIs) to their software so their devices can be linked. So far, Microsoft and a few smaller companies have signed on. Complete article at http://www.cio-today.com/story.xhtml?story_id=1230048NFJFU