Source: informationweek.com
Malware Responses: What To Do Before, During, And After An Attack Don't let a malware attack ruin your business. A little planning and the right responses can make it a minor annoyance instead of a major catastrophe. By Ross M. Greenberg TechWeb.com
Source: news.bbc.co.uk
Security threats to PCs with Microsoft Windows have increased so much that computer users should consider using a Mac, says a leading security firm. Sophos security said that the 10 most commonly found pieces of malicious software all targeted Windows machines.
Source: washingtonpost.com
Symantec is warning that it has detected a new piece of malware that tries to exploit a flaw in Mac OS X systems that Apple released a patch to fix just two days ago.
Source: eweek
A security researcher with expertise in rootkits has created a working prototype of new technology that is capable of creating malware that remains "100 percent undetectable," even on Windows Vista x64 systems.
Source: it.slashdot.org
Over the last few days an advertiser used an ad to install the ErrorSafe malware that tried to trick people into believing they had a fault on the computer that needs them to purchase a fix.
Source: technewsworld.com
"The sheer volume of IM attacks is a dramatic demonstration that we're in an environment where hackers, knowing that most organizations are still unprotected against IM malware, are rapidly adopting IM for their attacks," said Andrew Lochart, senior director of marketing for Pos …
Source: Information Week
The identities included Social Security numbers, names, and addresses, and were transmitted to an unknown hacker by the keylogging Trojan horse that was on a PC in the state agency where the employee has been working.
Source: news.zdnet.co.uk
More than 60 percent of compromised PCs scanned by Microsoft were found to be running malicious bot software
Source: techdirt.com
There's been a lot of talk about how iPods and other portable devices pose a security risk to companies, as employees may store important company documents of them. Now there's fear that such devices could upload malware and infect corporate systems.
Source: ajc.com
Instant messaging, the quicker-than-e-mail alternative for online communication, is moving rapidly from teenagers' bedrooms to mainstream America.
Source: australianit.news.com.au
"He lumped the thing back to Microsoft's headquarters and turned it over to a team of top engineers, who spent several days on the machine, finding it infected with more than 100 pieces of malware, some of which were nearly impossible to eradicate."
Source: news.yahoo.com
This article details the musings of Konstantin Sapronov, a virus analyst and Kaspersky Labs. He notes 100% increase in 2005 of malicious threats against Linux and predicts that the Mac platform is next.
Source: iht.com
The New York State attorney general sued another Internet pop-up advertising company Tuesday, accusing it of secretly installing malicious programs on personal computers...
Source: eweek.com
I'm switching my crappie Windows server at home to a Mac Mini, and I've already dumped my previous Windows laptop in favor of a Powerbook. That leaves only 1 Windows machine to go.
Source: foxnews.com
Excerpts from BBC News stories lure Internet Explorer users to malware download sites.
Source: theregister.co.uk
A Russian website is selling a DIY spyware kit, called WebAttacker, for around $15 a throw. The site, which proudly boasts of its creator's credentials in the scumware industry, also offer technical supporter to potential buyers.
Source: slyck.com
Some may remember Sony BMG's mistake of putting rootkit technology on people's computers without the users knowledge even if he or she reads or rejects the terms and conditions.
Source: boingboing.net
Brazilian mega-star Marisa Monte's new CDs from EMI ("Infinito Particular" and "Universo ao Meu Redor") come with DRM that can't be uninstalled, and requires you to "agree" to a contract that isn't published in Portuguese. Even if you disagree, the malware is installed.
Source: rfidvirus.org
Maybe they have a point in blowing the proverbial whistle this early but coming from a week-long information security training, I learned that the scenario they have enumerated is indeed possible. Hopefully something's being done to prevent any future RFID-based malware.
Source: lurhq.com
This may be just plain old F.U.D. but it pays to be careful. As always, never open attachments and keep your browsers off those "shady" websites. I just hope my Windows-using friends and colleagues doesn't get hit by this.