Security Information and Review

Collection of security information and review

Archive for the 'Virus Security' Category

Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site

Author : Admin

Latest vulnerability has been found in Mozilla Firefox v3.5 and v3.6 that is caused due to an unspecified error and can be exploited to execute arbitrary code by tricking a user into visiting a specially crafted site. If a user visited an infected site, the malware might be installed on the user’s computer without warning. The malware is delivered and installed by way of a malicious JavaScript that exploit a vulnerability in Firefox v3.5 and v3.6.

The malware ( Trojan ) was initially reported as live on the Nobel Peace Prize site and that specific site is now being blocked by Firefox’s built-in malware protection. However, the exploit code could still be live on other site. The Malicious JavaScript as Exploit:JS/Belmoo and the payload as Backdoor::Win32/Belmoo.A ( BKDR_NINDYA.A : Trend Micro ). … continue reading : Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site.

28 October 2010 at 16:26 - Comments

Computer Worm : Definition and How to Prevent it

Author : Admin

Computer worm is a computer program that is designed to replicate itself without any user intervention and interaction. It uses a network to send copies of itself to other network / nodes automatically, commonly computer worms can replicate in great volume and spread very quickly.

Computer Worms, one of virus type that spread automatically, irrespective of human behavior and by exploiting bugs in applications that are connected to the internet, such as Code Red, Nimda and Slammer. … continue reading : Computer Worm : Definition and How to Prevent it.

8 September 2009 at 15:05 - Comments

Step by Step to Combat Malicious Code Attacks

Author : Admin

In the previous discussion, overview, explanations and solutions malicious code, we already know the definition and types of malicious code and how to prevent this attack with simple solutions. In this discussion, we will discuss how step by step to combat malicious code attacks.

 

As Administrator or user, we should understand how basic steps contribute to the goal of countering malicious code attacks. See following list below for detail instructions how to combat malicious code. … continue reading : Step by Step to Combat Malicious Code Attacks.

3 August 2009 at 16:43 - Comments

Overview, Explainations and Solutions of Malicious Code

Author : Admin

In this discussion, we will provides an overview of malicious code and explain the basic principles of how malicious code works. Malicious code is simply one of an attacker tools to penetrate or disrupt systems. So, when a malicious code attack occurs, administrators will be focus on restoring operations as quickly as possible so that the loss of productivity and or other types of impact can be minimize.

 

If we understanding how malicious code works can help to develop defensive strategies, select the best security product such as antivirus program or firewall and train employees on how to identify potential threats. We will explain the various types of malicious code that have caused computer users problems in the past. … continue reading : Overview, Explainations and Solutions of Malicious Code.

3 August 2009 at 14:24 - Comments

Conficker Worm and Windows vulnerabilty

Author : Admin

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction. Conficker is effecting and targeting the Microsoft Windows Operating System that it’s most sophisticated capability. Conficker, also known as Downup, Downadup and Kido. The first variant of Conficker propagated through the internet by expoliting a vulnerabity in a network service [ MS08-067 ]. This list of Microsoft Windows Operating system that has been affected by RPC DCOM vulnerability :

… continue reading : Conficker Worm and Windows vulnerabilty.

30 May 2009 at 18:03 - Comments

How to protect from Conficker Worm

Author : Admin

Conficker worm is exploiting vulnerability of Microsoft Windows at RPC DCOM vulnerability, for detail see Microsoft Bulletin MS08-067 and Conficker Worm and Windows Vulnerabilty at this site. The worm uses a combination of advanced malware techniques which has made it difficult to counter and eradicate.

Whatever the case, the first and best solution if you find the vulnerability security on your system is doing patching. Antivirus program is basically designed not to keep the attacks exploit of security vulnerability that technically the computer Operating System that contains antivirus up to date will be infected with a virus that attacks this vulnerability, the main reason is because vulnerability security of operating system allows many things, including the execution of a file virus can without intervention by the antivirus program.

… continue reading : How to protect from Conficker Worm.

30 May 2009 at 08:08 - Comments