by Dave Michmerhuizen & Luis Chapetti – Security Researchers If you’re a malware spammer, the number one challenge you face is how to get people to open, read and follow links in your message. To accomplish this, one of the driving emotions that spammers appeal to is curiosity. For years spammers have sent emails offering glimpses of gory accidents, scantily clad women and outrageous celebrity behavior – anything that might get you to drop your guard, suspend your critical thinking and click through some dodgy link in the hope of seeing some juicy nugget. An excellent example of that fell into the Barracuda Labs spam traps recently. It claimed that President Obama is a homosexual and offered an incriminating picture that would prove it.
Daily Archive: April 16, 2012
Thanks to reader Dan for sharing the following information: McAfee has confirmed that incremental DAT 6682 may trigger message scan failures and a system crash in GroupShield Exchange (MSME), GroupShield Domino, and McAfee Email Gateway 7 (MEG). McAfee recommends that customers do NOT upload DAT 6682. More information will be available on the McAfee KnowledgeBase (https://mysupport.mcafee.com) in article KB70380 (https://kc.mcafee.com/corporate/index?page=contentid=KB70380).
“Jonathan Millican is a first-year university student from Harrogate in North Yorkshire. He says he doesn't think of himself as a “stereotypical geek”, but having been crowned champion in Britain's Cyber Security Challenge, the 19-year-old is bound to take some stick from his undergraduate friends at Cambridge. The competition is not well known, but it is well contested….”
“High Vulnerabilities :360zip — 360zipadobe — acrobatantonin_descampe — openjpeggoogle — chromemicrosoft — windows_7microsoft — biztalk_servermicrosoft — . net_frameworkmicrosoft — ieMedium Vulnerabilities :apache — hadoopatvise — webmi2adscloudera — cloudera_managercmsmadesimple — cms_made_simpledotnetnuke — dotnetnukedotnetnuke — dotnetnukehp — system_management_homepageicz — sencha_snsLow Vulnerabilities :hp — procurve_switch_5400zlibm — tivoli_event_pumpwireshark — wireshark…”
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
“Nabil Ouchn is a co-founder of NETPeas and the person behind the vastly impressive ToolsWatch. Nabil took the time to speak to us a bit about ToolsWatch and their involvement in the Black Hat arsenal…
Apple has released security updates to address Flashback malware in the following products: OS X Lion v10.7.3 OS X Lion Server v10.7.3 Mac OS X v10.6.8 Mac OS X Server v10.6.8 Apple has released a malware removal tool for the most common variant of the Flashback malware.
“Recently, Russian Anti-Virus company Doctor Web, found that the Flashback Mac Trojan had infected more than 600,000 systems, further quashing the myth that Apple's OS X is somehow immune to malware threats. The Trojan exploited three Java vulnerabilities to gain remote access to the infected systems and likely included a keylogger capability to capture authentication credentials. Doctor Web created an online tool for uses to see if they had been infected by the Flashback Trojan, F-Secure has instructions on how to remove the virus, and Apple announced they had successfully patched the vulnerability….”
“As part of my participation in Wikistrat, I get to see some pretty brilliant debates on what can – can't – will – and (hopefully) won't happen across the geopolitical sphere. And while the Cyber sphere of geopolitics continues to trouble many with Fear – Uncertainty – Doubt, there is one area where the general consensus of the “Good Guys” is the same:Let me preface the rest of this by saying I do not care who The Jester, The Raptor, YamaTough, Anons, etc. are