Facebook has fixed a security vulnerability that could be exploited by an attacker to record video from a victim's webcam and then post it to their timeline without requesting their permission.
Security firm: We have bypassed Microsoft's IE6-8 "Fix it" patch
A security firm claims to have found a way to bypass Microsoft's "Fix It" Patch for Internet Explorer 6, 7 and 8 which would allow the exploit that the patch closes to be used by hackers.
Password Security Scanner 1.10
This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords.
Microsoft Security Bulletin Advance Notification for January 2013
Microsoft published the Microsoft Security Bulletin Advance Notification for January 2013
Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing
Microsoft has released updates for Windows for the Microsoft Untrusted Certificate Store
Internet Explorer Zero-Day Used in Watering Hole Attack: Q&A | Symantec
Watering hole attacks have been in the news as of late. Symantec published a question and answer blog post to explain exactly what a watering hole attack is, its prevalence and how to prevent an attack .
"A watering hole attack is a method of targeting sites which are likely to be visited by targets of interest. The attacker will compromise the site and inject JavaScript or HTML to redirect victims to additional malicious code. The compromised site is then left “waiting” to exploit users who visit through drive-by downloads."
"A watering hole attack is a method of targeting sites which are likely to be visited by targets of interest. The attacker will compromise the site and inject JavaScript or HTML to redirect victims to additional malicious code. The compromised site is then left “waiting” to exploit users who visit through drive-by downloads."
Microsoft Security Advisory (2794220): Vulnerability in Internet Explorer Could Allow Remote Code Execution
Microsoft announced Saturday that older versions of Internet Explorer (v 6, 7 and 8) are vulnerable to remote execution code that the bad guys are currently using to target those with mainly IE 8.
They are working on the issues and will eventually release a patch, but your best bet is to upgrade to IE 9 or 10 ASAP or even try a different browser like Chrome
They are working on the issues and will eventually release a patch, but your best bet is to upgrade to IE 9 or 10 ASAP or even try a different browser like Chrome
RogueKiller 8.4.2
RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.
Council on Foreign Relations Website Hit by Watering Hole Attack, IE Zero-Day Exploit | threatpost
The Council on Foreign Relations website has been hit by a watering hole attack using an IE 8 zero-day exploit. Watering hole attacks target topically connected websites that an attacker believes members of a particular organization will visit often.
IObit Malware Fighter 1.7.0.0 (1230)
IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.
Microsoft confirms zero-day bug in IE6, IE7 and IE8
Microsoft on Saturday confirmed that Internet Explorer (IE) 6, 7 and 8 contain a zero-day vulnerability
IObit Malware Fighter 1.7.0.0 (1228)
IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.
New Trojan for Android can mount DDoS attacks
The Russian anti-virus vendor Doctor Web warns Internet users about a new malicious program for Android. TheAndroid.DDoS.1.origin can carry out DDoS-attacks on various internet resources and send short messages upon a corresponding command from criminals.
As yet it is not known exactly how the virus is spread.
As yet it is not known exactly how the virus is spread.
Malwarebytes Anti-Malware 1.70.0.1100 Final
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. It monitors every process and stops malicious processes before they even start. Over 6 million downloads on Majorgeeks alone!
Kaspersky XoristDecryptor 2.2.116.0
Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.
IObit Malware Fighter 1.7.0.0
IObit Malware Fighter is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers.
Malwarebytes' Anti-Malware Database December 24, 2012
Update your Malwarebytes' Anti-Malware Database when online update fails or malware prevents it.
RogueKiller 8.4.1
RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.
Pirate Bay Censorship Backfires as New Proxies Bloom | TorrentFreak
After legal threats from the music industry the UK Pirate Party saw no other option than to shut down their Pirate Bay proxy service. However, as is usually the case with censorship, the Internet has found a way to route around it. Responding to the UK situation Pirate parties in Argentina and Luxembourg have decided to start fresh Pirate Bay proxies.