Security Information and Review

Collection of security information and review

Archive for October, 2010

Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site

Author : Admin

Latest vulnerability has been found in Mozilla Firefox v3.5 and v3.6 that is caused due to an unspecified error and can be exploited to execute arbitrary code by tricking a user into visiting a specially crafted site. If a user visited an infected site, the malware might be installed on the user’s computer without warning. The malware is delivered and installed by way of a malicious JavaScript that exploit a vulnerability in Firefox v3.5 and v3.6.

The malware ( Trojan ) was initially reported as live on the Nobel Peace Prize site and that specific site is now being blocked by Firefox’s built-in malware protection. However, the exploit code could still be live on other site. The Malicious JavaScript as Exploit:JS/Belmoo and the payload as Backdoor::Win32/Belmoo.A ( BKDR_NINDYA.A : Trend Micro ). … continue reading : Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site.

28 October 2010 at 16:26 - Comments

Tips and Tricks Protect Your System from Malware

Author : Admin

Malware, also known as scumware, short for malicious software. It’s designed to secretly access a computer system without the owner’s informed consent. Some malware programs have been written with a profit motive ( financial or otherwise ) in mind. This can be taken as the malware authors’ choice to monetize their control over infected systems: to turn that control into a source of revenue.

Some malware are produced to gathering information of the victim activities and then showing pop-up advertising, it’s known as Adware. Some adware programs will redirect to search engine results to paid advertisements. Another way that financially motivated malware creators, use sensitive information from a victim. In this case, some malware program install a key logger that will automatically transmitted a password, credit card number, account and other information to the malware creator. It’s called Stealware, example of this type of malware : bancos, Gator, Legmir and Qhost. So, It’s very dangerous ….! In this post, we will explain how to protect our system from malware. … continue reading : Tips and Tricks Protect Your System from Malware.

28 October 2010 at 12:59 - Comments