Reliable Answers - News and Commentary

Virus Information News

How To Master CSS

How To Master CSS

"With How To Master CSS, you'll discover how to read stylesheets, how to recognise the best solution and how to translate a graphical design to a real website, simply by watching my fun and sophisticated training videos. Hundreds of people, just like you, worldwide have used my unique multimedia course to fast-track their Stylesheet learning, while having piles of fun in the process. Will you be next?"

It doesn't matter what level you are at now (beginner or intermediate), How to Master CSS is packed full of quality step-by-step lessons, video files, an editor and other resources to get YOU results fast!

      
 Title   Date   Author   Host 

F-Secure Weblog

by Threatinsight

April 3, 2012

Last week Kahu Security blogged about Escalating Java Attacks . Kahu's post dissects two Java exploits.

The first exploit targets CVE-2012-0507, the latest Java vulnerability that's been seen being exploited in the wild. This vulnerability was patched (for Windows) by Oracle in February 2012. I found the second exploit to be more interesting. It clearly appeared to be related to some Java CORBA vulnerability, possibly CVE-2012-0506, a Java vulnerability not yet known to be exploited in the wild. Last Friday I decided to take a closer look at this mysterious exploit.

F-Secure Weblog

by Threatinsight

March 15, 2012

WordPress.org is being targeted once again, and although this time there isn't much sneaky sophistication, the infection is still prevalent enough for Internet users to be wary.

Spam appears to be the driver of these campaigns. Various websites have already been identified to be redirecting to Blackhole exploit kit. Compromised websites would render any of the following pages upon visit...

F-Secure Weblog

by Threatinsight

January 26, 2012

Facebook is recently doing a decent job at keeping survey spam posts at bay (all things considered).

So, what's an entrepreneurial Facebook spammer to do? Well, some have tweaked their master plan, and have expanded their use of "cloud" services. Using Amazon's S3 file hosting service solves quite a few problems for these perpetrators. Number 1, Amazon's S3 web service is pretty inexpensive to set up, therefore they can still earn from the surveys. Number 2, because Facebook has been pretty successful at blocking suspicious URLs linked to spam, hosting their scam's code in a safe and popular domain such as amazonaws.com gives them a better chance to sneak through Facebook's protections.

F-Secure Weblog

by Threatinsight

January 10, 2012

Yesterday, we stumbled across this ad from an Android-related site. Clicking this led to a malicious Android Market...

F-Secure Weblog

by ThreatInsight

June 27, 2011

There was a recent report of a malicious Android package installation being hosted on a fake "Android Market"-lookalike site, which was pushed to users from an advertisement link.

The distribution strategy itself is not new. We saw variations of this happening with Google advertisements 2 years back, though in that case it was rogue or scareware that was being pushed by the advertisements. What is interesting about the case is: Android application repackaging. We've seen this tactic being used quite frequently in the last few months, as it seems to be the favored "quick" way for malware authors to produce new Android malware.

F-Secure Weblog

by ThreatInsight

May 24, 2011

The next time you see another post on a phishing attack and think "there's no way I'm going to fall for that", you might want to reconsider.

As general users become adept at detecting a phishing attempt, the authors are changing their tactics and are taking the time to learn about the target beforehand. This e-mail for instance, was sent to a person who recently made a purchase from the AppStore on his iPad. The "coincidental" timing is enough to warrant at least an attention from the intended recipient. Combined with tricks such as spoofed address and vague links, the recipient might even fall for the trap.

F-Secure Weblog

by ThreatInsight

May 12, 2011

Last week there was an outbreak on Facebook of video spam related to Osama bin Laden's death.

If a curious user clicked on the link in the spam, it would eventually bring them to a page which basically makes the user manually send out spam to his own FB contacts, under the guise of a 'security check' to view the video...

F-Secure Weblog

by Threatresearch

September 5, 2012

In the last year ZeuS has separated into more than one separately developed crimeware families after the source code for version 2.0.8.9 was leaked. An interesting development is a peer-to-peer version of ZeuS, which has been dubbed "Gameover".

The Gameover peer-to-peer (P2P) version was the second ZeuS derivative to appear in the wild and uses a peer-to-peer network to fetch configuration files and updates from other infected computers. The extensive changes incorporated into the derivative focus almost exclusively on the configuration file, and appear to be aimed at hindering retrieval and analysis. Many of the changes are to code sections that have been unaltered for years, such as the binary structure and compression method, which has not changed since 2008 (version 1.2). The date this version was released to the public can be estimated from the registration data for the domains created by its Domain Generation Algorithm (DGA)...

F-Secure Weblog

by Threatresearch

June 13, 2012

We normally see malware developing and evolving over the years. One particular malware we've been following is ZeroAccess, which has been continuously improving [since] we first detected it in late 2010.

Case in point: in the latest samples, its self-deletion routine has changed. This is a simple Windows batch file ZeroAccess used to use to remove itself after execution, as a fast and simple way to hide any traces of its presence from the user (click for larger view)...

F-Secure Weblog

by Threatresearch

May 31, 2012

Android malware news: a year after Zsone's discovery, we've come across a new variant. Or at least a sample that causes us to ask, is a new variant under development? This new Zsone uses a native component for its SMS sending routine.

      

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Carschooling by Diane Flynn Keith
Carschooling
[DesignAdvice] - learn and discuss Internet and Web Design

Take me to the top

Your Ad Here?

Contact our Marketing department for information about advertising on this domain.


Take me to the top

We invite you
to visit:

Professional Web Hosting and Design Services: 12 Point Design Local Homeschool provides the most up-to-date support group listings in a geographical and searchable index Budget Homeschool Kidjacked -- To seize control of a child, by use of force SaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security Reliable Answers - developer information, current news, human interest and legislative news Twain Harte Times - Twain Harte, CA - The closest you can get to Heaven on Earth Cranial Laser & Neurolymphatic Release Techniques (CLNRT) - Experience dramatic pain reduction At Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling pain Visit UniveralPreschool.com to learn about your preschool options.
Reliable Answers.com/virus/news.asp AddThis Social Bookmark Button
Google