Security Information and Review

Collection of security information and review

Posts Tagged 'malware'

Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site

Author : Admin

Latest vulnerability has been found in Mozilla Firefox v3.5 and v3.6 that is caused due to an unspecified error and can be exploited to execute arbitrary code by tricking a user into visiting a specially crafted site. If a user visited an infected site, the malware might be installed on the user’s computer without warning. The malware is delivered and installed by way of a malicious JavaScript that exploit a vulnerability in Firefox v3.5 and v3.6.

The malware ( Trojan ) was initially reported as live on the Nobel Peace Prize site and that specific site is now being blocked by Firefox’s built-in malware protection. However, the exploit code could still be live on other site. The Malicious JavaScript as Exploit:JS/Belmoo and the payload as Backdoor::Win32/Belmoo.A ( BKDR_NINDYA.A : Trend Micro ). … continue reading : Critical Vulnerability in Mozilla Firefox, Belmoo and Nobel Peace Prize Site.

28 October 2010 at 16:26 - Comments

Tips and Tricks Protect Your System from Malware

Author : Admin

Malware, also known as scumware, short for malicious software. It’s designed to secretly access a computer system without the owner’s informed consent. Some malware programs have been written with a profit motive ( financial or otherwise ) in mind. This can be taken as the malware authors’ choice to monetize their control over infected systems: to turn that control into a source of revenue.

Some malware are produced to gathering information of the victim activities and then showing pop-up advertising, it’s known as Adware. Some adware programs will redirect to search engine results to paid advertisements. Another way that financially motivated malware creators, use sensitive information from a victim. In this case, some malware program install a key logger that will automatically transmitted a password, credit card number, account and other information to the malware creator. It’s called Stealware, example of this type of malware : bancos, Gator, Legmir and Qhost. So, It’s very dangerous ….! In this post, we will explain how to protect our system from malware. … continue reading : Tips and Tricks Protect Your System from Malware.

28 October 2010 at 12:59 - Comments

Step by Step to Combat Malicious Code Attacks

Author : Admin

In the previous discussion, overview, explanations and solutions malicious code, we already know the definition and types of malicious code and how to prevent this attack with simple solutions. In this discussion, we will discuss how step by step to combat malicious code attacks.

 

As Administrator or user, we should understand how basic steps contribute to the goal of countering malicious code attacks. See following list below for detail instructions how to combat malicious code. … continue reading : Step by Step to Combat Malicious Code Attacks.

3 August 2009 at 16:43 - Comments

Overview, Explainations and Solutions of Malicious Code

Author : Admin

In this discussion, we will provides an overview of malicious code and explain the basic principles of how malicious code works. Malicious code is simply one of an attacker tools to penetrate or disrupt systems. So, when a malicious code attack occurs, administrators will be focus on restoring operations as quickly as possible so that the loss of productivity and or other types of impact can be minimize.

 

If we understanding how malicious code works can help to develop defensive strategies, select the best security product such as antivirus program or firewall and train employees on how to identify potential threats. We will explain the various types of malicious code that have caused computer users problems in the past. … continue reading : Overview, Explainations and Solutions of Malicious Code.

3 August 2009 at 14:24 - Comments