Avoiding and Removing Rogue Programs? Here’s how

If you frequently visit security discussion boards, you are sure familiar with Eric L. Howes’ – Rogue/Suspect Anti-Spyware Products & Web Sites. We visit that webpage to keep ourself familiar or be aware on antispyware products that might give us more problem than a fix or protection. Eric is also listing the domain names of the offending antispyware programs. In Calendar of Updates, we try to keep everyone inform by posting additions and delisted (if any) programs. Example: see the calendar entry few weeks ago. Visiting the above webpage of Eric L. Howes will help to avoid installing a deceitful program or a suspect … Continue reading Avoiding and Removing Rogue Programs? Here’s how

Firefox Password Manager Information Disclosure

Affected Software:  Mozilla Firefox 1.xMozilla Firefox 2.x Robert Chapin has discovered a vulnerability in Firefox, which can be exploited by malicious people to conduct phishing attacks. The vulnerability is caused due to the Password Manager not properly checking the URL before automatically filling in saved user credentials into forms. This may be exploited to steal user credentials via malicious forms in the same domain. The vulnerability is confirmed in version 2.0.0. Other versions may also be affected. Solution: Disable the “Remember passwords for sites” option in the preferences.  http://secunia.com/advisories/23046/

Apple Mac OS X UDTO HFS+ Denial of Service Vulnerability

LMH has reported a vulnerability in Mac OS X, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to errors in the handling of UDTO HFS+ image structures and can be exploited to cause a system panic. NOTE: This is only remotely exploitable via the Safari web browser when the “opening safe files after downloading” option is enabled. The vulnerability is reported in a fully patched Mac OS X (2006-11-21). Other versions may also be affected. Solution: Disable the “opening safe files after downloading” option. Grant only trusted users … Continue reading Apple Mac OS X UDTO HFS+ Denial of Service Vulnerability

Rutkowska: Anti-Virus Software Is Ineffective

Earlier this year, stealth malware researcher Joanna Rutkowska created a stir at the Black Hat Briefings when she demonstrated a way to infect Windows Vista with a rootkit and introduced Blue Pill, a new concept that uses AMD’s SVM/Pacifica virtualization technology to create “100 percent undetectable malware.” In this interview with eWEEK senior editor Ryan Naraine, Rutkowska talks about her interest in computer security, the reality of stealth malware threats, the risks associated with hardware virtualization and why the anti-virus industry comes up short. More at Eweek via Calendar of Updates

Norton 360 Beta is now available for download

http://www.symantec.com/norton360beta/ Norton 360 provides all-in-one protection that keeps you, your family, your PC, and your information secure. This comprehensive solution combines Symantec’s proven, industry-leading security and PC tune-up technologies with new automated backup and antiphishing features, providing a full circle of protection. Norton 360 is a comprehensive consumer security solution that offers a full circle of protection and eliminates the need to purchase and manage multiple products. Defends your PC against a broad range of threats Safeguards against online identity theft Protects important files from loss Keeps your PC tuned up for peak performance Provides a hassle-free user experience Protects … Continue reading Norton 360 Beta is now available for download

Hacking Email: 99 Email Security and Productivity Tips

ITSecurity.com published “Hacking Email: 99 Email Security and Productivity Tips“.  That’s 99 Tips! When people read out a phone number, they use “phone rhythm.” No one has to explain “phone rhythm,” we all just seem to do it automatically, “…713…555…12…34”. Similarly, when we answer a phone call we all say, “Hello.” No one taught us to do that, but somehow we all seemed to pick it up. So why is it that when it comes to emails, there are no accepted standards? Even though 6 billion emails are sent every day, almost no one agrees about simple things like email … Continue reading Hacking Email: 99 Email Security and Productivity Tips

Vista on Dell XPS M1210; Vista & Dell MediaDirect; Incompatible software

Another thing that made me excited to install Vista on my Dell notebook is to find out whether the cool functions of the Dell notebook will work. The cool functions in Dell’s new notebooks is the Dell MediaDirect button and the camera button (if the user opted for a built-n webcam and microphone).Will Dell MediaDirect button will still work if Vista is installed? Will the camera button will work if Vista is installed? More details at my other blog page http://dozleng.com/internetsecurity/?p=111 (Note, there’s no news there, just some pointers from me on computers, Windows and others) [:)]

Adobe Security Bulletin APSB06-18 – Vulnerabilities in Flash Player

Update available for HTTP Header Injection Vulnerabilities in Adobe Flash PlayerRelease date: November 14, 2006Vulnerability identifier: APSB06-18CVE number: CVE-2006-5330Platform: All Platforms Summary Adobe has provided a Flash Player 9 update to resolve vulnerabilities in Flash Player. These vulnerabilities would allow remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks.Affected software versions Adobe Flash Player 9.x, 8.x, and 7.x. The custom-header addition feature was added starting with Adobe Flash Player 7, thus Flash Player 6 and earlier are not affected. Solution Adobe recommends all users of Adobe Flash Player 9.0.20.0 and earlier versions upgrade to … Continue reading Adobe Security Bulletin APSB06-18 – Vulnerabilities in Flash Player

AVG Anti-Virus Multiple File Parsing Vulnerabilities

Affected Software: AVG Anti-Virus Free Edition 7.xAVG Antivirus 6.xAVG Antivirus ProfessionalAVG Antivirus Server Sergio Alvarez has reported some vulnerabilities in AVG Anti-Virus, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. 1) An integer overflow error when parsing CAB archives can be exploited to cause a heap-based buffer overflow via a specially crafted CAB archive. 2) An unspecified error when parsing RAR archives can be exploited to cause a heap-based buffer overflow via a specially crafted RAR archive. 3) An uninitialized variable error exists within the parsing of CAB archives. … Continue reading AVG Anti-Virus Multiple File Parsing Vulnerabilities

Microsoft Security Bulletins for November 2006

Microsoft released the following security bulletins today: Important MS06-066 – Vulnerabilities in Client Service for NetWare Could Allow Remote Code Execution (923980) Critical: MS06-067 – Cumulative Security Update for Internet Explorer (922760) MS06-068 – Vulnerability in Microsoft Agent Could Allow Remote Code Execution (920213) MS06-069 – Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (923789) MS06-070 – Vulnerability in Workstation Service Could Allow Remote Code Execution (924270) MS06-071 – Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (928088) The Security Bulletin Summary at http://www.microsoft.com/technet/security/bulletin/ms06-nov.mspx