Workaround for zeroday WMF exploit

Wednesday, December 28th, 2005

It’s worth repeating a few things here. There is a nasty exploit in the way that WMF images are parsed in Windows. This means that WITHOUT user intervention a system can be remotely exploited and through that exploit various software (spyware, viruses, other malware) can be installed. There is no patch at this moment, I […]

Network Security guide for the home or small business network – Part 15 – Security Through obscurity

Tuesday, December 27th, 2005

I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this […]

Spyaxe Spytrooper spysherriff et al removal

Wednesday, December 21st, 2005

There are so many “wolves in sheeps clothing” or maybe I should say wolves in sheepdogs clothing… Anyway, so many nasty malware’s that pose as protective utilities. Spyaxe, spytrooper, spy sherriff, etc. There is a tool that is specialized towards removing these. Smitrem which is short for smitfraud removal. (After the viral name of one […]

Wow serious VMWare vulnerability HOST system infection

Wednesday, December 21st, 2005

A flaw in vmware could allow malicious code to be run on the host machine according to Sunbeltblog and citing VMWare’s knowledge base. This is pretty big since this is something that’s not considered as a threat. (Many people use vmware and other virtual machines for malware/virus/spyware investigations because they’re supposed to be isolated from […]

Disinfecting a PC… part 8

Wednesday, December 21st, 2005

All right, now it’s time to give ad-aware a spin. I like being able to use several spyware scanners to get full coverage and cleaning. Ad-aware and spybot s&d are usually my first two choices. Realize that I’ve already taken a pass at this machine with AVG, BHODemon (for the browser helper objects) and Spybot […]

Malware scanning?

Monday, December 19th, 2005

The SANS institute is warning of an increase in reports of malware scanning for vulnerabilities. Currently these samples of malware are undetected by current antivirus signatures. They’re requesting samples of the malware for analysis. The last such surge in scanning was about a week ago when they noted a spike in scans to port 1026. […]

Disinfecting a PC… part 4

Saturday, December 17th, 2005

So, AVG has been scanning away finding things we’ve really got a foothold on the system and the malware has a fight on it’s hands. It’s good to see progress. Up to this point we’ve had multiple Spool32 errors (printer related). These errors are what prompted the system to be brought in initially. There’s a […]

Adobe moving to monthly patch cycle

Thursday, December 15th, 2005

I just saw a news article (sorry no link at the moment)… that mentioned that Adobe has announced they will move to a monthly patch cycle. This takes a cue from Microsoft which since October of 2003 has had a predictable monthly patch release. It’s nice to see security patches released in a routine, expected, […]

A couple warnings related to fake security sites

Wednesday, December 14th, 2005

Sunbelt has this warning about yet another fake security site. This one is laid out a bit different than the others we’ve seen in recent days. It’s not quite the same spoof of the Windows Security Center, but it makes use of Microsoft’s security logo. (And it does say Security Center at the top of […]

The letters keep coming…

Thursday, December 1st, 2005

I really don’t know how a SMALL operation can do any kind of software scanning with all the…. legal challenges to have to answer to. Of course, I suppose some don’t, they just cave and their scanners suffer in effectiveness. Anyway, Sunbelt Software blogs about ANOTHER cease and desist letter they’ve received from the makers […]

Google
 
Web www.averyjparker.com