# Tags

Operation B49

Since couple of weeks back Microsoft has been working on secret Operation B49 to wipe out Waledac botnet. Waledac is one of the largest botnets active and having major presence in US and European countries. This botnet is believed to be actively sending spam messages and had capacity to send billions of spam mails per […]

Security threat on smartphones and tablets

Computer scientists at Rutgers University have demonstrated that rootkits (a familiar threat on PCs) can now attack your smartphones or upcoming tablet computers (like iPad). Vinod Ganapathy, professor at Rutgers University in New Jersey says “Smart phones are essentially becoming regular computers. They run the same class of operating systems as desktop and laptop computers, […]

Google Buzz surprised many of its users

Google recently launched Google Buzz had to roll back the automatic implementation of the service to its users after strong protest from its users. Google Buzz is nice add on service to all GMail users that helps add social features to their account. Buzz tries to make the social interaction of its users more live […]

Xbox Phishing Site

For years, PC users have been suffering from phishing threats. But now, the newest phishing attack targets users of Microsoft’s Xbox console. The phishing site (hosted in Timor-Leste) collects Xbox user’s account information (which is Windows Live E-mail address and Password). These Xbox Live accounts are then traded for real world cash (on sites such […]

Alureon infected system show BSOD after MS10-015 applied

If your system has restarted after applying the MS10-015, this might be a sign that your system is infected with the notorious W32.Alureon malware. It is one of complex and advanced piece of malware which is been in existence for quite sometime now. Some of the function it is loaded with are modification of DNS […]

2010 Top 25 most dangerous programming errors

The MITRE Corporation has come out with 2010 CWE/SANS Top 25 Most Dangerous Programming Errors. They have presented the data in such a neat fashion which is quite helpful for all the developer community. So you may be a developer, tester, designer, teacher or system administrator. There are lot of things one can learn out […]

Important fixes for flash out, Adobe Acrobat fixes to arrive next.

Adobe software is second only to Microsoft when it comes to number of exploits used in targeted hacker attacks. Last week Adobe published a fix for Flash that addresses a critical vulnerability in Flash. We advise all our users to upgrade to new version of Flash Player. It is also expected that Adobe will release […]

New wave of Phish mail seen on radar

A new wave of the phish mail of Income tax department (Govt. of India) earlier blogged by Sanjay here, have been seen in our radar from today morning. Just started to see mails targeting Bank of India too. We have released update to protect all our user.

Advance Notification February Microsoft Bulletin Release.

Yesterday Microsoft released the February bulletin. This month they plan to release 13 bulletin, five rated Critical, seven rated Important, and one rated Moderate – addressing 26 vulnerabilities. Eleven of the bulletins affect Windows and the remaining two affect Office. The recently published Advisory 980088, “Vulnerability in Internet Explorer Could Allow Information Disclosure” fix is […]

After PS3 hack Xbox 360’s got hacked

Christopher Tarnovsky, a researcher at Flylogic Engineering made it possible to hack TPM which was considered as most secure. TPM – Trusted Platform Module chips which are considered as hardware based industry standard securing chip designed by Trusted Computing Group is being used my many vendors for storing encryption keys and implementing security and is […]