In the security bulletin released on 12 May 2011, Adobe announced to have fixed critical Flash player bugs of version 10.2.159.1 and earlier for Windows, Macintosh, Linux and Solaris, 10.2.154.28 and earlier for Chrome and 10.2.157.51 and earlier versions for Android. These vulnerabilities could cause the application to crash and also potentially allow an attacker to take control of the affected system.
Adobe also reported to… Continue reading
As expected, Google released its new version v11.0.696.68, after the claims from VUPEN security researchers to have pwned Chrome. The new version of Chrome comes with the updated Adobe Flash Player 10.3.
As a reply to the claims on pwn of Chrome, security researcher Dan Kaminksy said that if VUPEN used vulnerability in Flash to bypass sandbox, then it is not the Chrome hack… Continue reading
The most secure features of Google Chrome, including Sandbox, ASLR and DEP, were simply bypassed by VUPEN security researchers. The vulnerability is for the most latest version of Google Chrome (v11.0.696.65) for Windows.
The vulnerability is found to be impacting all Windows based computers running 32 bit as well as 64 bit OS. The vulnerability was exploited by just making the user visit a… Continue reading
A recent report from Websense shows the alarming rate of increase in cyber crime activity in Canada. While US still stands as the major hub of hosting phishing websites, Canada occupies second place followed by Egypt. Comparing with the Opendns report published recently on top countries hosting phishing websites in 2010, Germany falls back to forth position from second.
The following are top countries… Continue reading
On contrary to the gigantic updates on the previous Patch Tuesday, Microsoft has released only 2 critical updates this month – one of the lightest Patch Tuesdays in recent years.
What seems interesting here is the fix for Windows Internet Name Service, which allows the NETBIOS devices to communicate on the network. As per the bulletin MS11-035, the flaw in WINS (Windows Internet Name Service) enables… Continue reading
A new mutation of ransomware, which asks for reactivation of Windows, has been reported by F-secure. The user gets a blue screen, saying that the Windows license has been locked. The message screen exactly looks like the Windows screen during installation of OS. There is even a Windows logo on the top-right corner of the screen, to make the message look authentic.
Immediately after the massive earthquake and tsunami in Japan, experts noticed many Internet fraudsters exploiting the situation through black hat SEO techniques.
The experts said that the criminals immediately started customizing their malicious websites, including keywords related to tsunami and earthquake, to get on top of the search results using black hat seo methods. It has been found out that they were trying to deploy malware… Continue reading
Ever thought Linux is invulnerable and robust against malware attacks? then its time to rethink. Security researchers at TrendMicro found malware that can exploit routers based on Linux and Unix platforms. The malware, though was said to be predominantly found in Latin America, has possibilities of spreading to other regions.
Potential of the threat
As per the source: the malware code, found to be ELF_TSUNAMI.R, has… Continue reading
Google had released latest version for Chrome (9.0.597.107) fixing around 19 bugs on Monday. And within no time Mozilla has also come up with latest version of Firefox (3.6.14).
Interestingly, these were released just before the Pwn2Own hacking contest (to be starting on March 9th). Even in 2010, Google released 18.104.22.1686 version, days before the contest. Apple also had released updates for Safari in 2010 in… Continue reading
Your online accounts stay safer as long as your passwords are stronger and secure. However, creating stronger passwords is not enough in today’s scenario where id theft is most prevalent. Handling of passwords is equally important as of creating strong passwords. The following are few blunders made by consumers in 2010, reported in a study from Internet security firm Webroot.