Jump to content

Humpty

Experienced Members
  • Posts

    2,107
  • Joined

  • Last visited

Posts posted by Humpty

  1. Description:

    Secunia Research has discovered a vulnerability in Foxit Reader, which can be exploited by malicious people to compromise a user's system.

     

    The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the "util.printf()" JavaScript function. This can be exploited to cause a stack-based buffer overflow via a specially crafted PDF file.

     

    Successful exploitation allows execution of arbitrary code.

     

    The vulnerability is confirmed in version 2.3 build 2825. Other versions may also be affected.

     

    Solution:

    The vulnerability is fixed in upcoming version 2.3 build 2912.

     

    Provided and/or discovered by:

    Dyon Balding, Secunia Research.

    Secunia Article

  2. INSTALLING A HUSBAND

     

    Dear CCleaner Tech support,

     

    Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed a distinct slow-down in overall system performance, particularly in the flower and jewelry applications, which operated flawlessly under Boyfriend 5.0.

     

    In addition, Husband 1.0 uninstalled many other valuable programs, such as Romance 9.5 and Personal Attention 6.5 and then installed undesirable programs such as NBA 5.0, NFL 3.0 and Golf Clubs 4.1.

     

    Conversation 8.0 no longer runs, and Housecleaning 2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail.

     

    What can I do? :huh:

     

    Signed, Desperate.

     

     

    Humpty:

     

    Dear Desperate, way too hard for me to sort as I always thought this was normal. :unsure:

  3. Security experts have warned that new developments in malware are allowing criminals to stay one step ahead of security software.

     

    Marc Henauer, head of the cyber-crime division at the Swiss Justice and Police Department, said in an interview last week that viruses and other malware now have the capability to change their signature every few hours.

     

    This means that the attackers are often one step ahead of protection software.

     

    Geoff Sweeney, chief technology officer at Tier-3, a behavioural analysis IT security firm, echoed the remarks.

     

    "Self-changing code designed to dynamically evade recognition is a fact of life," he said. "It automatically adapts to the anti-spam and anti-malware engines that it encounters."

    Article

  4. Downloaded utorrent and went through the preferences but couldn't seem to hide the tray icon without actually shutting it down.

     

    If the tray icon isn't showing it still shows in the takbar as minimized.

  5. The scams rely on a technique known as social engineering to trick computer users into divulging personal information that the cybercriminals or their customers can use to bilk unwary taxpayers.

     

    The new phishing scams use spam e-mails to gull prospective refund recipients into providing their bank account information and other personally identifiable data via a fraudulent form that is attached to the original message by a hyperlink.

     

    The bureau?s fraud notice also echoes IRS? own anti-phishing warnings and actions against IRS spoof sites. The IRS recently stated that the number of bogus IRS sites has increased twelvefold this year over last year.

    Article

  6. Blimey! :blink:

    Zango?s high-profile lawsuit against anti-spyware company Kaspersky Lab is ?akin to a cat burglar suing the alarm company,? Kaspersky?s law firm argued to a federal appellate court.

     

    In papers filed this week with the 9th Circuit, Kaspersky said that Zango has no grounds to sue the security company for removing Zango?s software, which serves pop-up ads. ?Allowing Zango?s suit will have a chilling effect on the Internet security industry and, ultimately, on use of the Internet,? Kaspersky argues.

     

    Calling security software vendors ?the sentinels of the Internet,? Kaspersky argued that forcing such companies ?to allow malware to pass through a computer?s ?gates? unchallenged will compromise computer security and, ultimately, the free flow of information over the Internet.?

    Article

  7. Ethical or not? :unsure:

    There has been a fair amount of controversy as of late surrounding The Race to Zero contest to be unofficially held at DEFCON 16 this coming August. To briefly summarize, contestants are to be given samples of computer viruses/malware and access to a contest portal. The portal will take malware samples submitted by the contestants and run them through a collection of anti-virus engines, checking to see if the samples are detected. The contestants will make modifications to the malware samples in attempts to slip modified samples past the AV engines undetected. In keeping with the mischievous hacker zeitgeist of DEFCON, awards will be given for the ?Most Elegant Obfuscation,? ?Dirtiest Hack of an Obfuscation,? ?Comedy Value? and ?Most Deserving of Beer.?

     

    AV vendors were predictably upset by the prospect of this exercise. Most objections seemed to boil down to two main assertions:

     

    1. The contest involves the creation of new strains of malware, which can serve no constructive purpose.

    2. The contest will only serve to help the bad guys learn new techniques in their arms race with AV vendors.

     

    Contest organizers have stated their goal is simply to demonstrate the limitations of AV software, information that AV customers deserve to have. Their position is that the contest explores legitimate areas of security research and that investigation of AV bypass techniques is a worthwhile goal. Organizers have also pointed out that new malware is being created 24?7x365 in the wild, while at the contest?s conclusion any new malware samples created will be securely deleted from the contest systems.

    Race To Zero

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.