Security Blogs (Page 1 of 1)  
Just what is this botnet called Kneber?
F-Secure, 2010-02-19


A Perfect Valentine’s Day
Symantec Security Response - By: Vivian Ho, 2010-02-12

Planning a romantic Valentine’s Day for your loved one? Is there is no end to all that you can do to add even more sparkle this dreamy day? Perhaps a bottle of wine, flowers, or a lovely gift to impress him/her—and if you aren’t with anyone, there are even dating services available that provide you with options to meet a date.



Cybercrime and the FIFA World Cup: 2010 Net Threat Website Launched
Symantec Security Response - By: Josh Talbot, 2010-02-10

I recall watching a Sandra Bullock film called “The Net” in the mid-nineties. It was about a software engineer, played by Bullock, who inadvertently became entangled in a Web of cyber espionage and eventually had to fight for her identity (and even her life) in a flood of harrowing situations.



An Apple a Day
F-Secure, 2010-02-03
We were recently asked some questions about Mac security. Mikko's comments can be read at CNET.

Also in Apple news, iPhone/iPod touch OS 3.1.3 has been released and there are security fixes.

(Not that it's mentioned during the update.)

And speaking of iPhones, they're vulnerable to remote attack on SSL.

On 03/02/10 At 02:46 PM



Password-Protected Word Document In W32.Zimuse
Symantec Security Response - By: Liam O Murchu, 2010-02-02
While analyzing W32.Zimuse recently I was surprised to find two different passwords used within the threat: one of these decrypts a Word document that contains information about some members of a Slovakian motorbike forum.

Trojan.Hydraq – Typhoon In A Teacup
Symantec Security Response - By: Patrick Fitzgerald, 2010-01-29
If you have been following this series on Trojan.Hydraq over the last week you may have noticed that the blog entries have been well, boring.

Trojan.Hydraq's Backdoor Capabilities
Symantec Security Response - By: Patrick Fitzgerald, 2010-01-28
At this stage we’ve looked at several features of Hydraq, including its obfuscation techniques and how it remains on an infected system. So, what control does the attacker have over a compromised system?

iPad SEO Poisoning Leads To Rogue Security Software
Symantec Security Response - By: Joji Hamada, 2010-01-28
Yesterday we saw SEO poisoning attacks when searching for keywords such as "Apple Tablet". Now, after the product announcement has been made, we are seeing the same attack with the actual name of the product included in the search term.

Is the lack of iPad Flash support for security?
F-Secure, 2010-01-28
We've received some questions regarding Apple's iPad, and whether or not the lack of Adobe Flash support is for security reasons.

Loose Tweets Sink Fleets
F-Secure, 2010-01-27
Information leakage is a real problem.



 

Privacy Statement
Copyright 2010, SecurityFocus