Windows Security »
Most of us dislike having toolbars in our browsers because they are annoying; not only do they tend to hijack our homepages, but they use up a lot of screen real estate, making it more difficult to surf the web… especially if you have 12 toolbars installed in one browser.…Read More »
Adobe Reader, Adobe’s popular PDF viewer, has a flaw that is allowing hackers to install malware on users’ computers. The exploit affects the latest version of the program (11.0.1), as well as earlier versions. This appears to be Windows only.
Adobe engineers have tried to make malware attacks harder to carry out on their software by implementing a sandboxing technique, but this new attack bypasses those defenses.…Read More »
32% of computers around the world are infected with viruses and malware, according to Panda Security
Most anti-virus companies like to release yearly reports based on their findings throughout the year. Panda Security is no exception and has released its ’2012 Annual Security Report’. In this report you will find some stats that may or may not shock you.…Read More »
Be sure to run Windows Update this Tuesday, Microsoft is going to release a monster update that fixes 57 vulnerabilities — including a critical Internet Explorer bug
Every second Tuesday of every month Microsoft releases patches of its products on Windows. This day has come to be known as ‘Patch Tuesday’. And this upcoming Patch Tuesday is going to be one you don’t want to miss.
In total, this Tuesday (February 12) will see twelve patches being released that address a total of 57 vulnerabilities across various different Microsoft software, including Internet Explorer, Microsoft Office, .NET Framework, and Windows itself.…Read More »
Attacks on Java may be subsided for a few days but the other kink in your armor — Flash — is now under attack. Adobe has released a security bulletin notifying Windows and Mac OS X users to update to Flash 11.5.502.149 because of an ongoing attack targeting Windows and Mac OS X users, an attack that exploits a Flash vulnerability in previous versions of Flash.…Read More »
Some may call it obvious but just having antivirus software installed isn’t going to help you much if hit by zero-day attacks. The New York Times had antivirus from Symantec (Norton) installed on the devices connected to their network, but that didn’t stop Chinese hackers from retrieving usernames and passwords of their reporters, among other things.…Read More »
Latest version of Java (7u11) is still vulnerable, Oracle issued an incomplete patch according to experts
Something surprising happened last week. Oracle issued an update (Java 7u11, Java 6u37, Java 5u38, and Java 4u40) in just three days to patch a recently discovered and massively exploited Java vulnerability. And over the weekend, too. As it turns out, Oracle didn’t do a very good job.…Read More »
There are two groups in this world that are notoriously quick to react to technological change — the porn industry and hackers. The porn industry is known for pioneering new technology to try to increase revenue. For example, porn websites were one of the first websites that started accepting payments online.…Read More »
AV-TEST Institute is an organization that runs anti-virus/anti-malware tests. During AV-TEST Institute’s latest Nov/Dec 2012 anti-malware testing, 3 out 25 anti-virus software failed to gain certification. One of those 3 is Microsoft’s popular Security Essentials. (The other two are AhnLab V3 Internet Security and PC Tools Internet Security 2012.)
According to AV-TEST Institute, Microsoft Security Essentials failed to satisfactorily protect against 0-day malware attacks, scoring only 71 percent detection rate.…Read More »
You know that latest Java exploit that had the world up in arms, with Firefox and Apple blocking Java and U.S. Department of Homeland Security recommending people disable Java? Yeah, well, Oracle has issued updates to Java to address and plug the exploit.…Read More »
New Java zero-day exploit hits the internet, is “massively exploited in the wild” — disable Java now!
So you thought Java season was over, eh? Wrong! It is still open season on Java and a brand new, previously unknown bug has been discovered in Java that allows scumbags to install malware on the computers of netizens.
It isn’t entirely clear how this exploit is conducted but it has been tested and confirmed to work on all versions of Java 7 (including the latest Java 7u10); it may or may not work on earlier versions of Java.…Read More »
It looks like the bad news for Microsoft’s Internet Explorer just keeps piling on, with every other day seemingly bringing news about a new security problem for the browser.
This time, however, users of the most recent versions — namely Internet Explorer 9 and 10, can rest easy.…Read More »
If there’s one thing that Microsoft doesn’t need, it’s more bad publicity for Internet Explorer. The company’s browser has often been criticized to be slow and simply downright inferior compared to other offerings right now. Unfortunately for them, it looks like more bad news is on the way.…Read More »
French magazine L’Express is reporting that, last May, the computers in the offices of Nicolas Sarkozy (who was still president back then) were hacked by the “Flame” malware. This is that same malware that made headlines for being developed by the United States and Israel for intelligence and disruption purposes related to the Iranian nuclear program.…Read More »
Some companies, and individuals, find and disclose vulnerabilities — may those be on websites, operating systems, programs, whatever — for the betterment of society. Others do it for a “finder’s fee”. VUPEN does it so they can sell the secrets to whomever wants them.…Read More »
Do you ever feel sorry for Adobe? I mean, yeah, it is hard to feel sorry for a multi-billion dollar corporation that likes to use closed standards and charge us for the privilege. But still, you have to feel for them; two of their products, Flash and Reader, are two of the most exploited programs out there.…Read More »
Java, Flash, and iTunes are in the “top 10 vulnerabilities” list — Microsoft products are nowhere to be found
Kaspersky Labs, a digital security firm, releases a quarterly “IT Threat Evolution” report. For the Q3 2012 report, one section provides information as to what programs have the most widely spread vulnerabilities. I’m sure you can guess some but may be surprised by others.…Read More »
[Windows] Comodo Cleaning Essentials is a portable tool that helps find, stop, and remove malware/viruses
There are tons of different virus and malware removal tools out there. However, the problem is most of these programs have to be installed to do their job. What if you get hit by a virus that prevents you from installing new software and you have nothing to remove it?…Read More »
Despite using some of the most popular and expensive anti-virus programs, some users are still infected with stubborn malware. If your other anti-malware programs are of no help, Symantec’s new tool Norton Power Eraser could be the answer to remove such stubborn bugs.…Read More »
Due to their frequent giveaways last year, most of us probably have heard of — if not used — Zemana AntiLogger, a security solution that costs $29.95 per year. However, I’m sure most dotTechies have not yet heard of Zemana AntiLogger Free, the freeware version of Zemana AntiLogger.…Read More »
Malware is being spread with “lol is this your new profile pic” message on Skype — be careful what you click
Skype users be warned: if you get a message on Skype that says “lol is this your new profile pic” with an accompanying http://goo.gl/XXX?img=XXX URL, do not click on the link!
It is being reported by various security firms, and confirmed by Skype, that many Skype users are being spammed with an “lol is this your new profile pic http://goo.gl/XXX?img=XXX” instant message.…Read More »
Windows XP is the most exploited version of Windows while infections on Windows 7 are increasing, according to Microsoft
Wondering which version of Windows you should stick to be the safest? According to data released by Microsoft in its most recent Microsoft Security Intelligence Report, Windows XP remains at the top of the list when it comes to most infected Windows version while Windows 7 — particularly 64-bit Windows 7 — is the least infected.…Read More »
New malware (ransomware) locks your computer claiming you violated the law under SOPA, asks for $200 if you want your files back
Ransomware is a type of malware that locks your computers, encrypts your files, etc. to prevent you from accessing your data and asks for money if you want to regain access. In other words, your data is held ransom, hence the name ransomware.…Read More »
Yesterday we learned Innovative Marketing, a firm that developed scareware programs, has to pay a fine of $163 million. In the comments of the article, Rob mentioned another scareware scam — “tech support” calling up people, telling them there are issues with their computers, and charging them for the privilege of fixing fake repairs.…Read More »
In this day and age, most semi-tech savvy computer users know what scareware is. For those that don’t, scareware is not malware, per se, but it is software that make you think like you have a problem on your computer (when you actually don’t) and charge you a large sum of money for the privilege of cleaning up that “problem”.…Read More »
Be careful what you rent — rent-to-own computers from seven companies spied on users, stealing passwords and photographing… sex
You know those scary stories you hear about how a hacker took control of someone’s webcam and videotaped or photographed them without their knowledge? Yeah, well, it turns out hackers aren’t the only ones doing such things — companies that rent out computers do such things, too.…Read More »
New Java vulnerability in Java 5/6/7 bypasses Java security sandbox, affects 1 billion users worldwide
Is it open season on Java? Or has the season for Java never ended? Who knows. I do know, however, that yet another vulnerability has been discovered in Java. This time the vulnerability affects Java 5, Java 6, and Java 7, meaning roughly one billion users around the world are vulnerable.…Read More »
Microsoft releases new update to plug Internet Explorer exploit — get this now even if you got the earlier one (both 32-bit and 64-bit are supported)
Earlier this week dotTech brought you news about a vulnerability affecting Internet Explorer. Microsoft realized the significance of the vulnerability and quickly issued a hack-and-slash Fix it utility to patch the vulnerability. Aside from the fact that the earlier Fix it apparently didn’t support 64-bit machines, it also wasn’t a “full” fix — it was something quick Microsoft put together to stop exploitation while they fully investigated the issue.…Read More »
You know that Internet Explorer vulnerability affecting Internet Explorer 7/8/9 on Windows XP/Vista/Win7 dotTech recently posted about? Yeah, well, it looks like Microsoft is on the ball with this one; they have just issued an easy-to-apply ‘Fix it’ to patch the vulnerability.…Read More »
Whether it be through Windows or its online services, Microsoft touches the lives of many, many people around the world on a daily basis. So when an e-mail from “Microsoft <email@example.com>” with the subject of “Important Changes to Microsoft Services Agreement” magically appears in the inbox of many people, my guess is they are likely to open it.…Read More »
New vulnerability in Internet Explorer 7, 8, and 9 allow hackers to remotely control your Windows XP, Vista, and Windows 7 computer
A couple back-to-back Java vulnerabilities hit the cyber waves a few weeks back. The cyber criminal gang that exploited those vulnerabilities seems to have developed a new zero-day attack. This time the attack has Internet Explorer in its crosshairs.
Security researchers are reporting there is a new zero-day vulnerability affecting Internet Explorer — IE 7 and 8 on Windows XP, and IE 9 on Windows Vista and Windows 7 — that allows scumbags to remotely install malware on infected computers.…Read More »
In August 2011 Microsoft started an investigation into fake copies of Windows coming out of China. For this investigation, Microsoft employees bought 20 brand new PCs from various Chinese vendors and took them back to HQ to test for forfeit copies of Windows.…Read More »
Google Chrome does something unique with Flash. Instead of relying on Flash as a third-party plugin, Chrome has a built-in version of Flash. Google is the one that manages updates for this built-in version of Flash as opposed to Adobe. While it may sound like this would result in a delay in Flash updates for Chrome, Google is actually on the ball and typically releases Chrome Flash updates the same day as Adobe updates Flash.…Read More »
You get an e-mail that looks like it is from Facebook. The e-mail says you have been tagged in a photo by a friend and the photo is attached to the e-mail. You open the attachment and BAM you are infected by a trojan known as Troj/Agent-XNN.…Read More »
Yesterday Oracle released an update to Java 7 (Java 7u7 update) that fixed nineteen critical vulnerabilities, two of which were exploited by in-the-wild attacks that installed malware on infected machines. It took Oracles four months to patch the just-mentioned vulnerabilities; it took security researchers less than 24 hours to find a new exploit in Java 7u7.…Read More »