| 

New hacked site notifications in search results

  • Post author: Omid Farhang
  • Post published: December 20, 2010
  • Reading Time: 2 min
  • Word Count: 318 words

Today we’ve added a new notification to our search results that helps people know when a site may have been hacked. We’ve provided notices for malware for years, which also involve a separate warning page. Now we’re expanding the search results notifications to help people avoid sites that may have been compromised and altered by a third party, typically for spam. When a user visits a site, we want her to be confident the information on that site comes from the original publisher. Here’s what the notification looks like: ...

Continue Reading New hacked site notifications in search results

Plenty of Updates announced

  • Post author: Omid Farhang
  • Post published: December 11, 2010
  • Reading Time: 1 min
  • Word Count: 59 words

Avira TechBlog: Next Tuesday is going to be tough for administrators: The Redmond company announces 17 security bulletins which are supposed to fix 40 security vulnerabilities. Only two of the bulletins deal with “high”ly critical rated security holes within Windows and the Internet Explorer. The rest of the updates fixes the Windows operating systems, Microsoft’s Office, SharePoint and Exchange.

Continue Reading Plenty of Updates announced

QuickTime 7.6.9 update resolves 15 vulnerabilities

  • Post author: Omid Farhang
  • Post published: December 11, 2010
  • Reading Time: 2 min
  • Word Count: 326 words

This week Apple announced the availability of QuickTime 7.6.9 for OS X 10.5 and Windows platforms. This release fixes 13 vulnerabilities in QuickTime for OS X Leopard and 15 vulnerabilities on the Windows platform. Keep in mind that if you use iTunes it requires that you install QuickTime as well, so be sure to check for updates. Apple has provided a direct download link for IT folks at http://www.apple.com/quicktime/download/. All 13 vulnerabilities for OS X can cause unexpected application termination (what you and I call a crash, but you can’t say crash on a Mac) or arbitrary code execution (make QuickTime run programs
 BAD). ...

Continue Reading QuickTime 7.6.9 update resolves 15 vulnerabilities

Improved Avira AntiVir Rescue System

  • Post author: Omid Farhang
  • Post published: December 7, 2010
  • Reading Time: 1 min
  • Word Count: 196 words

Avira programmers spent a lot of work and drastically overhauled the Avira AntiVir Rescue System which is now available in version 3.7.16. Next to a much better usability due to the redesigned user interface and 11 supported languages the new version offers even improved detection and removal capabilities. Avira AntiVir Rescue System uses Linux as operating system. The new kernel has much better and wider hardware support. The bootable CD can not only be used to analyse the system for malware infections and remove them, but also enables the user to get access to data on the system in case the operating system won’t start anymore so it can be backed up onto a USB drive, for example. ...

Continue Reading Improved Avira AntiVir Rescue System

Security issue in Website Optimizer

  • Post author: Omid Farhang
  • Post published: December 7, 2010
  • Reading Time: 1 min
  • Word Count: 203 words

Take a look in the Email I got from Google a few minutes ago: Dear Website Optimizer user, We are writing to inform you of a potential security issue with Website Optimizer. By exploiting a vulnerability in the Website Optimizer Control Script, an attacker might be able to execute malicious code on your site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack. While the immediate probability of this attack is low, we urge you to take action to protect your site. ...

Continue Reading Security issue in Website Optimizer

Proxy services take novel approach to privacy

  • Post author: Omid Farhang
  • Post published: December 6, 2010
  • Reading Time: 1 min
  • Word Count: 144 words

You’ve locked down your computer. Nothing is going to bypass your privacy shielding programs. AdBlock is fully loaded, NoScript is ready to roll and RefControl is sending “Party on, Wayne” as your custom referrer to all and sundry. However, you really want to hide your IP address too and decide to load up one of the many web-based proxy services available. Something humorous I’ve noticed across many web-based proxies recently is that they’re jumping on a marketing strategy that might be slightly at odds with their attempts at privacy for the end-user. In order to keep your private details private, you have to _fill in a survey and hand over a bunch of information to third party marketers. _ Type in a URL, hit the “Go” button on the proxy and you’ll see one of these: ...

Continue Reading Proxy services take novel approach to privacy

Stuxnet and WikiLeaks – What do they have in common?

  • Post author: Omid Farhang
  • Post published: December 4, 2010
  • Reading Time: 2 min
  • Word Count: 254 words

At first glance, two recent security stories, the Stuxnet attack on Iran’s nuclear industry and the WikiLeaks breach of US State Department communications, don’t seem to have much in common, but they do. They are united by a vector, a method of transmission and that vector is removable media. I am sure that the Iranians felt pretty secure with air-gapped systems, but like a spark from the burning house next door that finds its way into your shingles, the right USB found its way into the right PC and then suddenly all those uranium enrichment centrifuges running at 807-1210 hz started to act funny and fail in unexpected and reportedly fairly energetic ways (you can see some pics of failed centrifuges here http://web.mit.edu/charliew/www/centrifuge.html and here http://www.chem.purdue.edu/chemsafety/NewsAndStories/CentrifugeDamages.htm). ...

Continue Reading Stuxnet and WikiLeaks – What do they have in common?

Paypal’s advise: “Use your bank account for your Paypal-payments”. Really ?!

  • Post author: Omid Farhang
  • Post published: December 1, 2010
  • Reading Time: 3 min
  • Word Count: 612 words

Righard Zwienenberg, Chief Research Officer at Norman posted this on Norman Security Blog, Thanks to Mr.Fagerlid for sharing: I have been a user of PayPal for many years, actually ever since PayPal opened its services for international users. PayPal, originally only for US citizens, is now used worldwide with local offices in many countries. From the Dutch affiliate, I just received the next message from PayPal (the actual message was in Dutch, see picture below): ...

Continue Reading Paypal’s advise: “Use your bank account for your Paypal-payments”. Really ?!

Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

  • Post author: Omid Farhang
  • Post published: November 30, 2010
  • Reading Time: 4 min
  • Word Count: 744 words

Now this is not the first time Windows UAC has hit the news for being flawed, back in February 2009 it was discovered that Windows 7 UAC Vulnerable – User Mode Program Can Disable User Access Control and after that in November 2009 it was demonstrated that Windows 7 UAC (User Access Control) Ineffective Against Malware. A zero-day for Windows 7 back in July of this year also bypassed Windows UAC. ...

Continue Reading Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

Hidden second Wi-Fi network with the Thomson TWG870U router

  • Post author: Omid Farhang
  • Post published: November 13, 2010
  • Reading Time: 2 min
  • Word Count: 323 words

Righard Zwienenberg from Norman Security Center Blog posted something interesting, Thanks to Mr. Fagerlid for Sharing: There is some commotion in The Netherlands. Telecom/ISP provider UPC is providing its customers with the Thomson TWG870U router, a Docsis 3.0 router. On the tweakers.net forum (Dutch language), a user discovered that the router, which is also providing Wireless Access, has a second hidden wireless network. Problem here is that: ...

Continue Reading Hidden second Wi-Fi network with the Thomson TWG870U router