Internet Storm Center is now Yellow because…

the ANI exploit code is out 🙁 http://isc.sans.org/diary.html?n&storyid=2542 Users need to ensure your security protection can protect you from this type of incidents.  Of course, a patch to the vulnerability for affected systems but again, be careful and keep your antivirus and antispyware up-to-date!

ZonedOut has Favorite Helper!

I was looking for a utility that will allow me to send a URL to “Trusted” or “Restricted” zones in Internet Explorer. At times, I’m viewing a site that I want to add in “Restricted” zone or a site that I want to add in “Trusted” zone (if required to be in trusted zone of IE). I can’t find such utility so I send an email to friend Todd (aka Toadbee at Funkytoad.com) and requested to him to create a utility or add such option to ZonedOut.  As usual, Todd is quite helpful and a great programmer! He said “yes, … Continue reading ZonedOut has Favorite Helper!

MVP Profile URL Alias

My MVP Profile URL is: http://mvp.support.microsoft.com/profile=A7C6779B-CCEB-435A-8F3B-C07C89AE77A9 There’s URL Alias now — > https://mvp.support.microsoft.com/profile/Donna.Buenaventura That’s cool because it’s shorter and easier to remember [H] [:D] Some MVP might use their first name only or surname only as MVP Profile URL alias.  Some might stay in using the longish one.  Thanks to MVP Program Team for this new and cool Profile URL Alias of active Microsoft MVPs!

MSRC: Update on Microsoft Security Advisory 935423

Microsoft Security Response Center blogs some answers on the following questions regarding the above-mentioned Security Advisory: When we learned about the vulnerabilityWhen we learned about the attackWhat we’re doing to help protect customersWhen we expect to release an updateOur recommendation around 3rd party workarounds or updates http://blogs.technet.com/msrc/archive/2007/03/30/update-on-microsoft-security-advisory-935423.aspx  

Chinese servers host malicious cursor attacks

A criminal group responsible for using compromised Web sites to spread malicious software have already started using the latest Microsoft flaw to install their code from at least three servers in China, security experts said on Friday. The sites are using a flaw in the way Microsoft Windows handles animated-cursor files, which the software giant acknowledged on Thursday in a security advisory. While Microsoft has stated that the attacks using the animated-cursor vulnerability in Windows appear “to be targeted and not widespread,” as many as 25,000 compromised Web pages currently use JavaScript to send visitors to the malicious Chinese sites, … Continue reading Chinese servers host malicious cursor attacks

Attacks on Windows flaw rise

Hackers stepped up attacks Friday on computers running some versions of Windows, a day after Microsoft disclosed a hole related to the mouse cursor. Microsoft Corp. sent out a security advisory Thursday warning customers that a vulnerability in “.ani” files — used to change the cursor into an hourglass while a program works, or into a dancing animal or other animation on specially designed Web sites — was allowing hackers to break into computers and install malicious software. “Overnight we did see the attacks change from limited and targeted attacks to slightly more, but do still categorize it as a … Continue reading Attacks on Windows flaw rise

Bluetooth Dongle as sniffer

A post in Bugtraq with link to the : During the last year, rumours had come to my attention that apparently it is possible to transform a standard 30USD Bluetooth(r) dongle into a full-blown Bluetooth(r) sniffer. Thinking you absolutely need Hardware to be able to hop 79 channels 1600 times a second I was rather suspicious about these claims.This paper is the result of my research in this area, answering the question whether it is possible or not..Get it at http://www.remote-exploit.org/research/busting_bluetooth_myth.pdf http://www.securityfocus.com/archive/1/464311/30/0/threaded

America Online SuperBuddy ActiveX Control Code Execution

— Affected Vendor: America Online — Affected Products: America Online 9.0 Security Edition — TippingPoint(TM) IPS Customer Protection:TippingPoint IPS customers have been protected against this vulnerability since November 6, 2006 by Digital Vaccine protection filter ID 4553. For further product information on the TippingPoint IPS: http://www.tippingpoint.com — Vulnerability Details:This vulnerability allows attackers to execute arbitrary code on vulnerable installations of America Online with Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the LinkSBIcons() method exposed through the ActiveX control ‘Sb.SuperBuddy.1’ with the following … Continue reading America Online SuperBuddy ActiveX Control Code Execution

Saudi Arabia toughens stance on cybercrime

Saudi Arabia is finally implementing new laws designed to combat cybercrime, which were originally proposed last year by the nation’s advisory council, the Shura. A statement released by the cabinet this week has claimed that the new law, which will cover cybercrime offences such as hacking, will be enacted as soon as King Abdullah ratifies it. The country already has strong controls in place regarding access to certain types of online content, including pornography, which is outlawed under Islamic rules. According to the new law those found guilty of committing a cybercrime could find themselves 500,000 riyals (over $130,000) out … Continue reading Saudi Arabia toughens stance on cybercrime

Don’t be fooled on April 1

We’ll sure receive some April fools greetings or messages.  Don’t be fooled by anything especially if it’s live link or any email that you are expecting. Don’t download from untrusted source too and please keep basic security tools up-to-date to help protect from whatever their software can detect [:)] Yahoo! also write something today: Don’t be fooled: IM Phishing Scams