Internet Explorer .HLP vulnerability on Windows XP

Microsoft’s security team is investigating a security vulnerability reported at https://isec.pl/ by Maurycy Prodeus. The vulnerability is observed on operating system older than Windows Vista (i.e. Windows XP). In this, the attacker hosting a malicious website can remotely run arbitrary code by convincing the user to press the computer’s F1 key in response to a […]

Spanish police arrested 3 hackers as suspected masterminds of Mariposa botnet.

Mariposa botnet which has grown much stronger over last six months was posing a big challenge for security software developers. The botnet which was first observed in April-May 2009 has shown significant traffic growth over last six months indicating substantial number of compromised computers. The botnet was quite actively managed by these hackers who use […]

Rogueware “Security essentials 2010”

Microsoft has warned Windows users to be cautious against a rogueware (fake software) which calls itself Security Essentials 2010 as opposed to Microsoft Security Essentials which is a genuine security product from Microsoft. Security essentials 2010 installs a fake virus scanner on your machine and blocks some processes. It also blocks access to the websites […]

Search Engine Optimization (SEO) attacks are increasing rapidly

One has to be very careful when using search engine for looking for information or news on the latest hot topics. There are more chances of getting malware infection after visiting the websites listed in the results. Malware authors are creating more and more webpages which are loaded with newly created malwares, fake softwares, roguewares. […]

Operation B49

Since couple of weeks back Microsoft has been working on secret Operation B49 to wipe out Waledac botnet. Waledac is one of the largest botnets active and having major presence in US and European countries. This botnet is believed to be actively sending spam messages and had capacity to send billions of spam mails per […]

Security threat on smartphones and tablets

Computer scientists at Rutgers University have demonstrated that rootkits (a familiar threat on PCs) can now attack your smartphones or upcoming tablet computers (like iPad). Vinod Ganapathy, professor at Rutgers University in New Jersey says “Smart phones are essentially becoming regular computers. They run the same class of operating systems as desktop and laptop computers, […]

Google Buzz surprised many of its users

Google recently launched Google Buzz had to roll back the automatic implementation of the service to its users after strong protest from its users. Google Buzz is nice add on service to all GMail users that helps add social features to their account. Buzz tries to make the social interaction of its users more live […]

Xbox Phishing Site

For years, PC users have been suffering from phishing threats. But now, the newest phishing attack targets users of Microsoft’s Xbox console. The phishing site (hosted in Timor-Leste) collects Xbox user’s account information (which is Windows Live E-mail address and Password). These Xbox Live accounts are then traded for real world cash (on sites such […]

Alureon infected system show BSOD after MS10-015 applied

If your system has restarted after applying the MS10-015, this might be a sign that your system is infected with the notorious W32.Alureon malware. It is one of complex and advanced piece of malware which is been in existence for quite sometime now. Some of the function it is loaded with are modification of DNS […]

2010 Top 25 most dangerous programming errors

The MITRE Corporation has come out with 2010 CWE/SANS Top 25 Most Dangerous Programming Errors. They have presented the data in such a neat fashion which is quite helpful for all the developer community. So you may be a developer, tester, designer, teacher or system administrator. There are lot of things one can learn out […]