# Tags

StuxNet, CVE-2010-2568 misconceptions and facts

Lot is being discussed and written about the latest StuxNet worm/virus/trojan/rootkit. After analyzing the StuxNet samples and having closer look at the .LNK files I realized that lot of miss concepts are making round over the internet. Many of the security news websites have just copied the contents of blogs and added their own conclusions […]

Coca-Cola scam on Facebook

“I am part of the 98.0% of people that are NEVER gonna drink Coca Cola again after this HORRIFIC video –> https://www.[deleted_link_to_video]”. What will you do, if you get such post on your Facebook via your friend? Obviously you will be tempted to click the link. If you click on the link, you’ll be asked […]

CVE-2010-2568: LNK file automatically executes code in Control Panel shortcuts

Microsoft LNK files [MS-SHLLINK] which are now turned into auto executable files by malware authors using its undocumented feature is a hot topic on most of the security forums. We have received specially crafted LNK files along with Portable executable files having the mentioned LNK file vulnerability. When user visits the folder containing these files, […]

For Windows XP Service Pack 2 users

July’s patch release (blogged by Basant) marks the end of patching support for both Windows 2000 and Windows XP Service Pack 2. So, from now on there’ll be no security updates, hotfixes and other updates for Windows XP SP2, regardless of how serious a threat and newly discovered vulnerability may pose to users of this […]

Microsoft Security Bulletin released for the month of July

Microsoft has released its security bulletin for July 2010. This month Microsoft has released four bulletins, addressing total five vulnerabilities. All four bulletins are related to “Remote Code Execution” vulnerability. Out of the four bulletins, three bulletins are rated “Critical” and one bulletin is rated “Important”. The following bulletins have been rated “Critical”: – Bulletin […]

Mercedes Benz promotion email scam

I recently received a mail with the subject line “Mercedes Benz Promotion (Test Questions)”. The subject line was a clear indication that a scam was in the offering. Scammers always keep changing their techniques and try to exploit scenarios that might lure people to fall for their trap. In this scam, the scammers have tried […]

Cyber Criminals (Yahoo Boys) giving good business to Cybercafes in Nigeria

Lagos in Nigeria had been witnessing lot of fraudulent Internet activities as cybercafés out there had a major customer base of cyber criminals. Recently the law enforcement authorities in Cyber Crime unit in Lagos are constantly revising their strategies in their efforts towards cleaning out scammers from the nation. Being in anti-virus research we come […]

Beware of Loan Scam

In my earlier blog, I had mentioned how scammers had used current events such as “FIFA World Cup 2010” to launch fraudulent scams. But in this latest scam a sly approach has been taken by scammers to extract personal infromation from victims. I recently received a mail with the words LOAN APPLICATION in the subject […]

Increase your twitter followers, an innovative way to get victims

Recently I came across a below website that is promoting itself through twitter accounts of its members. When I saw its home page I was surprised to learn how people are coming out with innovative ways to collect innocent users login names and passwords of twitter accounts. Further this website seems to be using these […]

Update Mozilla Firefox

Firefox 3.6.4 has been released, this version address 7 vulnerabilities which range from critical issues such as denial of service or arbitrary code execution bugs along with a few lower level issues. Below is list of critical vulnerabilities fixed in this version MFSA 2010-30 Integer Overflow in XSLT Node Sorting MFSA 2010-29 Heap buffer overflow […]