Virus and Bug Patch AlertThis newsletter is sponsored by Akamai TechnologiesNetwork World's Virus and Bug Patch Alert Newsletter, 08/09/07New Xunlei 0-day exploit?By Jason MeserveToday's bug patches and security alerts: Potential New Xunlei 0-day Exploit Symantec has observed active exploitation of a potential 0-day vulnerability in Xunlei Web Thunder. This vulnerability has been assigned BID 25192. This vulnerability is closely related to a previously discovered Xunlei vulnerability identified as BID 24552. Exploitation of this new vulnerability may result in arbitrary download of malicious files onto the compromised computer. Symantec Security Response Weblog.
********** Two new patches from rPath: qt-x11-free (format string, code execution) ********** Two new updates from Debian: ********** Two new patches from Ubuntu: KOffice (integer overflow, code execution) ********** Foresight Linux releases three patches: ********** Today's malware news: Storm Worm's virulence may change tactics The swiftly spiking onslaught of the Storm Worm may signal an upcoming change in how its creators intend to wield their weapon. PC World, 08/02/07. Brazilian MSN Worm Looks Familiar Brazil is the home of the infamous Infostealer.Bancos family of malware. Recently, however, we have seen a more diverse number of sites - beyond just banking sites - coming into the crosshairs of the Brazilian malware gangs. Is the recent W32.Imcontactspam worm another of their creations? Symantec Security Response Weblog. Unknown Exploit Compromises Ichitaro Symantec Security has received a sample of an Ichitaro document that contains a currently unknown exploit. This is not necessarily surprising as most software has vulnerabilities but a user who opens the document will surely be hit with a surprise. Symantec detects the malicious document as Trojan.Tarodrop.D. Symantec Security Response Weblog. Rootkits, Downloaders, and Natalie Portman Got a round of these in my inbox this morning. These are EXEs being spammed out in e-mail messages to get you to install malware. The names of Hollywood stars used in the emails include Nicole Kidman, Angelina Jolie, and Natalie Portman. Arbor Networks Security to the Core blog. ********** From the interesting reading department: U.C. researchers: Take antispam fight to the Web According to researchers at the University of California, San Diego, antispam fighters could really hurt the spammers bottom line, if they target the Web sites used to host their scams rather than simply trying to block the mail server used to send out unsolicited commercial e-mail. IDG News Service, 08/07/07.Mozilla: 10 day patch guarantee 'not our policy' Mozilla does not set security policy at late-night pyjama parties. The open source browser maker was forced to issue a statement Monday, retracting a pledge attributed to the company's director of ecosystem development, Mike Schaver, to fix any critical security bugs in the browser within "Ten ****ing Days." IDG News Service, 08/06/07. Researcher blasts Apple for 'negligent' patching One of the researchers who went public last month with the first iPhone vulnerability said Monday that Apple's lackadaisical updating of the open-source components it uses in Mac OS X is inexcusable and negligent. Computerworld, 08/06/07. Study: IRS security vulnerable to social engineering The U.S. Internal Revenue Service computer network is vulnerable to social-engineering hacks, with 60 percent of employees changing their computer passwords when requested by phone callers posing as help-desk workers, according to a government auditor. IDG News Service, 08/03/07. Black Hat: Networked systems are putty in the hands of a good hacker Security practitioners at Black Hat prove that the computer systems in use today are pretty much just putty in the hands of a good hacker. Network World, 08/03/07. Data leak products have security risks Companies looking to clamp down on data leaks may be introducing a whole new set of security problems to their corporate networks, researchers from Matasano Security said at the Black Hat conference last Thursday. IDG News Service, 08/03/07. Analyst: iPhone security concerns exaggerated Security of the iPhone has been a hot topic among researchers and analysts since well before the device was even available to the public in June. While some have been ringing the warning bell that the iPhone is not suitable for the Enterprise, one analyst says those concerns have been overblown. MacWorld, 08/02/07. Do Botnets Dream of Digital Sheep? Right now, botnets are one of the most concerning problems in information security and are considered to be source of all evil like spam, click frauds and denial of service attacks. Bots are software and malicious programs which are installed on your computer illegitimately, forming the part of a larger command-and-control network called the botnet. Symantec Security Response Weblog. Affiliation networks: Google AdSense for hackers The next big threat to Web security has less to do with phishing and more to do with affiliation networks, according to a recent Web security report. Computerworld, 08/02/07. Editor's Note: Starting Aug. 13, this newsletter will be renamed "Security: Threat Alert" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!
|
| Contact the author: Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog. Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair" This newsletter is sponsored by Akamai TechnologiesARCHIVEArchive of the Virus and Bug Patch Alert Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment