New hacked site notifications in search results

Today we’ve added a new notification to our search results that helps people know when a site may have been hacked. We’ve provided notices for malware for years, which also involve a separate warning page. Now we’re expanding the search results notifications to help people avoid sites that may have been compromised and altered by a third party, typically for spam. When a user visits a site, we want her to be confident the information on that site comes from the original publisher. Here’s what the notification looks like: ...

December 20, 2010 · 2 min · 318 words · Omid Farhang

Plenty of Updates announced

Avira TechBlog: Next Tuesday is going to be tough for administrators: The Redmond company announces 17 security bulletins which are supposed to fix 40 security vulnerabilities. Only two of the bulletins deal with “high”ly critical rated security holes within Windows and the Internet Explorer. The rest of the updates fixes the Windows operating systems, Microsoft’s Office, SharePoint and Exchange.

December 11, 2010 · 1 min · 59 words · Omid Farhang

QuickTime 7.6.9 update resolves 15 vulnerabilities

This week Apple announced the availability of QuickTime 7.6.9 for OS X 10.5 and Windows platforms. This release fixes 13 vulnerabilities in QuickTime for OS X Leopard and 15 vulnerabilities on the Windows platform. Keep in mind that if you use iTunes it requires that you install QuickTime as well, so be sure to check for updates. Apple has provided a direct download link for IT folks at http://www.apple.com/quicktime/download/. All 13 vulnerabilities for OS X can cause unexpected application termination (what you and I call a crash, but you can’t say crash on a Mac) or arbitrary code execution (make QuickTime run programs… BAD). ...

December 11, 2010 · 2 min · 326 words · Omid Farhang

Improved Avira AntiVir Rescue System

Avira programmers spent a lot of work and drastically overhauled the Avira AntiVir Rescue System which is now available in version 3.7.16. Next to a much better usability due to the redesigned user interface and 11 supported languages the new version offers even improved detection and removal capabilities. Avira AntiVir Rescue System uses Linux as operating system. The new kernel has much better and wider hardware support. The bootable CD can not only be used to analyse the system for malware infections and remove them, but also enables the user to get access to data on the system in case the operating system won’t start anymore so it can be backed up onto a USB drive, for example. ...

December 7, 2010 · 1 min · 196 words · Omid Farhang

Security issue in Website Optimizer

Take a look in the Email I got from Google a few minutes ago: Dear Website Optimizer user, We are writing to inform you of a potential security issue with Website Optimizer. By exploiting a vulnerability in the Website Optimizer Control Script, an attacker might be able to execute malicious code on your site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack. While the immediate probability of this attack is low, we urge you to take action to protect your site. ...

December 7, 2010 · 1 min · 203 words · Omid Farhang

Proxy services take novel approach to privacy

You’ve locked down your computer. Nothing is going to bypass your privacy shielding programs. AdBlock is fully loaded, NoScript is ready to roll and RefControl is sending “Party on, Wayne” as your custom referrer to all and sundry. However, you really want to hide your IP address too and decide to load up one of the many web-based proxy services available. Something humorous I’ve noticed across many web-based proxies recently is that they’re jumping on a marketing strategy that might be slightly at odds with their attempts at privacy for the end-user. In order to keep your private details private, you have to _fill in a survey and hand over a bunch of information to third party marketers. _ Type in a URL, hit the “Go” button on the proxy and you’ll see one of these: ...

December 6, 2010 · 1 min · 144 words · Omid Farhang

Stuxnet and WikiLeaks – What do they have in common?

At first glance, two recent security stories, the Stuxnet attack on Iran’s nuclear industry and the WikiLeaks breach of US State Department communications, don’t seem to have much in common, but they do. They are united by a vector, a method of transmission and that vector is removable media. I am sure that the Iranians felt pretty secure with air-gapped systems, but like a spark from the burning house next door that finds its way into your shingles, the right USB found its way into the right PC and then suddenly all those uranium enrichment centrifuges running at 807-1210 hz started to act funny and fail in unexpected and reportedly fairly energetic ways (you can see some pics of failed centrifuges here http://web.mit.edu/charliew/www/centrifuge.html and here http://www.chem.purdue.edu/chemsafety/NewsAndStories/CentrifugeDamages.htm). ...

December 4, 2010 · 2 min · 254 words · Omid Farhang

Paypal’s advise: “Use your bank account for your Paypal-payments”. Really ?!

Righard Zwienenberg, Chief Research Officer at Norman posted this on Norman Security Blog, Thanks to Mr.Fagerlid for sharing: I have been a user of PayPal for many years, actually ever since PayPal opened its services for international users. PayPal, originally only for US citizens, is now used worldwide with local offices in many countries. From the Dutch affiliate, I just received the next message from PayPal (the actual message was in Dutch, see picture below): ...

December 1, 2010 · 3 min · 612 words · Omid Farhang

Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

Now this is not the first time Windows UAC has hit the news for being flawed, back in February 2009 it was discovered that Windows 7 UAC Vulnerable – User Mode Program Can Disable User Access Control and after that in November 2009 it was demonstrated that Windows 7 UAC (User Access Control) Ineffective Against Malware. A zero-day for Windows 7 back in July of this year also bypassed Windows UAC. ...

November 30, 2010 · 4 min · 744 words · Omid Farhang

Hidden second Wi-Fi network with the Thomson TWG870U router

Righard Zwienenberg from Norman Security Center Blog posted something interesting, Thanks to Mr. Fagerlid for Sharing: There is some commotion in The Netherlands. Telecom/ISP provider UPC is providing its customers with the Thomson TWG870U router, a Docsis 3.0 router. On the tweakers.net forum (Dutch language), a user discovered that the router, which is also providing Wireless Access, has a second hidden wireless network. Problem here is that: ...

November 13, 2010 · 2 min · 323 words · Omid Farhang