This week in computer security

That's the exact reason why I'm not on these sites.
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
They can still be useful. Just keep in mind that any info you put on these sites has the possibly of becoming completely public. In other words, don't put info there that you wouldn't want someone to see. Apply some common sense.
 
Joined
Aug 18, 2008
Messages
15,681
Location
Studio City, CA
its actually getting bad. just as potential employers expect you to have a cell phone these days they also expect you to have a LinkedIn profile and your proper name in an email address.

not having any of these can seriously hurt your hiring potential, particularly in high tech.
 
Joined
Oct 19, 2006
Messages
5,213
Location
The Uncanny Valley
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
The press tells me about an aggressive Trojan coming with E-Mails using respected titles of firms.

It encrypts your hard disk.

And then wants money to get it free again.

And of course it won't get free again.

("We've got their money. Why bother ?")
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Always check the addresses of ANY links you get in emails before clicking them. If they look suspicious in any way, don't click on them. Application of a little common sense goes a long way to protecting yourself.
 
Joined
Aug 18, 2008
Messages
15,681
Location
Studio City, CA
Yes, that's a lesson I learned with spam early in this century/millennium.

Or ask oneself : "Why should I do this ? Who would profit from me doing it ?"

And especially asking oneself : "What if this goes wrong ?"

This is the most important question one should ask oneself when doing any online transactions.
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
... Found a few articles ... :

- Zero-Day-Exploit with IE used . http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/

- Microsoft against 3322.com : http://blogs.technet.com/b/microsof...-spread-through-an-unsecure-supply-chain.aspx

- Localized "Hijacking-Software" spreading even further . http://www.h-online.com/security/news/item/Localised-ransomware-identified-by-Microsoft-1398912.html

- Microsoft vs. Zeus : http://www.h-online.com/security/news/item/Microsoft-names-alleged-Zeus-bot-herders-1631264.html

All found via www.heisec.de , my currently favourite security-related web site.
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Virus hides "behind" the mouse.

In short : if the mouse isn't moved, it becomes active. If it is moved, it remains inactive. Plus, it takes a LOT of time for itself : It becomes active only after 5 minutes, then it performs the next stepts only after 20 minutes of remaining in inactive mode after each step.

The whole report is here : http://www.symantec.com/connect/blo...iques-evade-automated-threat-analysis-systems


And Steam can be risky, too : http://www.h-online.com/security/news/item/Report-Steam-poses-security-risk-1731562.html
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
I had to format and do a reinstall this weekend.
My virus checker picked up an aggressive virus this weekend and after several unsuccessful attempts at dislodging the thing, I formatted.
What tipped me off(other than the red warning) was the slowdown of my internet to a crawl. I monitored my internet connection and my computer sent over 200 mg of data and downloaded over 2 gigs. In about an hour. I checked and everything I could see was off including Steam, windows update,other pcs, phones and internet tv's. Opening the task manager revealed nothing.
Went pretty smooth except that Blizzard locked my account the first time I tried logging into Diablo3.
More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.[40]
That is what I found-never heard of it before
 
Last edited:
Joined
Oct 18, 2006
Messages
1,397
Location
USA-Michigan
I guess so that there still exists places in the MBR into which a virus/trojan could hide things ? - That was kind of possible in DOS, too.

Bad if someone uses multi-boot programs, I don't believe that such a virus could detect it.

These things become more nd more sophisticated. Being offline is the only solution.
And worse, even routers can nowadays be hacked.
 
Joined
Nov 5, 2006
Messages
21,947
Location
Old Europe
Back
Top Bottom