web
analytics
Category

Security

File contained a virus and was deleted

By | Security | No Comments


style=”display:inline-block;width:336px;height:280px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”2110030350″>

I had a client that was recently getting this message.  If you are getting it, the cause can be a misconfiguration or worse.

Read More

Norton Hotspot VPN

By | Security, VPN | No Comments

One of the thorniest issues is traveling and maintaining security.  Norton has come up with a nice little VPN package that allows for secure surfing while on open networks.

Read More



style=”display:inline-block;width:200px;height:90px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”6819431556″>

Has LinkedIn Been Hacked?

By | Hacking, Security | No Comments

Well, that is the million dollar question, isn’t it?  I have seen a lot of accusation and rumor going around, but I have yet to see any substantiating evidence.

Read More



style=”display:inline-block;width:200px;height:90px”
data-ad-client=”ca-pub-1263642132905925″
data-ad-slot=”6819431556″>

Private Encrypted Chat

By | Security | No Comments

You may not know this, but when you use instant messenger, you are essentially chatting with the world.  Now, for most topics, who cares.  But, if you are chatting about something highly sensitive and private, you could be screwed.  That’s because anyone can simply eavesdrop on that conversation.  I’m fairly certain that you don’t want that in those circumstances.  Let’s look at a few of your options for securing instant messenger conversations.

Read More

Flashback Mac Malware Trojan

By | Hacking, Security | No Comments

Well, well, well.  What do you know.  Mac gains market share and now the malware wars begin.  Apple scrambled to push out an update today that removes the most common variants of Flashback and stop automatic execution of Java applets.  The threat is very serious as it attempts to mimic actions on websites for passwords.  This can fool the user into giving up very sensitive information, which is sent to remote servers.  You can simply do a Mac update to obtain the latest fix.

 

However, if you are already infected, you should utilize Apple’s fix or F-Secure’s Flashback Removal Tool or Symantec Flashback Removal Tool.  If you are unsure, do yourself a favor and use those removal tools just to make sure!

Stay safe.

Adobe Reader/Acrobat U3D Memory Corruption Vulnerability

By | Hacking, Security | No Comments

A new zero day for the Adobe Reader has been identified.  That means that it has no solution as of yet.  Adobe is frantically putting together a fix for next week.  Here are the verions/systems affected:

  • Adobe Reader X (10.1.1) and earlier 10.x versions for Windows and Macintosh
  • Adobe Reader 9.4.6 and earlier 9.x versions for Windows, Macintosh and UNIX
  • Adobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and Macintosh
  • Adobe Acrobat 9.4.6 and earlier 9.x versions for Windows and Macintosh

You can see the original report from adobe.

Nasty Microsoft Windows Shell Shortcut Parsing Vulnerability Zero Day Found

By | Security | No Comments

Here we go again.  Someone has found a nasty way to exploit your Windows machine.  The vulnerability is currently being exploited by W32.Temphid malware.  The issue seems to be in the way that windows parses .lnk shortcut files.  Here is M$’s take on it:

“The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut. This vulnerability is most likely to be exploited through removable drives. For systems that have AutoPlay disabled, customers would need to manually browse to the root folder of the removable disk in order for the vulnerability to be exploited. For Windows 7 systems, AutoPlay functionality for removable disks is automatically disabled.”

There is no current patch.

You can, however, disable displaying icons for link files, and kill this potential exploit.  via US-Cert:

Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the “Changing Keys And Values” Help topic in Registry Editor (Regedit.exe) or view the “Add and Delete Information in the Registry” and “Edit Registry Data” Help topics in Regedt32.exe.

1. Click Start, click Run, type Regedit in the Open box, and then click OK
2. Locate and then click the following registry key:
HKEY_CLASSES_ROOT\lnkfile\shellex\IconHandler
3. Click the File menu and select Export
4. In the Export Registry File dialog box, enter LNK_Icon_Backup.reg and click Save
Note This will create a backup of this registry key in the My Documents folder by default
5. Select the value (Default) on the right hand window in the Registy Editor. Press Enter to edit the value of the key. Remove the value, so that the value is blank, and press Enter.
6. Restart explorer.exe or restart the computer.