Ryan Naraine

Microsoft: Trojan Threat Significant, Rootkits Drop

New statistics from Microsofts anti-malware engineering team have confirmed fears that backdoor Trojans and bots present a “significant” threat to Windows users. However, according to data culled from the software makers security tools, stealth rootkit infections are on the decrease, perhaps due to the addition of anti-rootkit capabilities in security applications. The latest malware infection […]

Windows Spyware in Spotlight

In the first three months after shipping the Windows Defender Beta 2 anti-spyware application, Microsoft detected 22 million pieces of adware/spyware programs in Windows machines, resulting in about 14 million removals. According to statistics released by the Redmond, Wash., company, more than 60 percent of Windows Defender users have opted to remove the ad-serving programs […]

Metasploit Adds Wi-Fi Exploits

The Metasploit Project plans to add, sometime during the week of Oct. 30, 802.11 (Wi-Fi) exploits to a new version of its point-and-click attack tool, a move that simplifies the way wireless drivers and devices are exploited. The controversial open-source project, created and maintained by Austin, Texas, hacker HD Moore, has added a new exploit […]

Old Window Injection Flaw Reappears in IE 7

Microsofts freshly minted Internet Explorer 7 browser is vulnerable to a window injection vulnerability that has haunted earlier versions of IE since Dec. 2004, according to a warning from Secunia. The security alerts aggregator said the flaw, which carries a “moderately critical” rating, could be exploited to spoof the content of Web sites for use […]

Wi-Fi Exploits Coming to Metasploit

The Metasploit Project plans to add 802.11 (Wi-Fi) exploits to a new version of its point-and-click attack tool, a move that simplifies the way wireless drivers and devices are exploited. The controversial open-source project, created and maintained by HD Moore, of Austin, Texas, has added a new exploit class that allows modules to send raw […]

Rutkowska: Anti-Virus Software Is Ineffective

Earlier this year, stealth malware researcher Joanna Rutkowska created a stir at the Black Hat Briefings when she demonstrated a way to infect Windows Vista with a rootkit and introduced Blue Pill, a new concept that uses AMDs SVM/Pacifica virtualization technology to create “100 percent undetectable malware.” In this interview with eWEEK senior editor Ryan […]

Windows Defender Goes Gold, Removes Win2K Support

Windows Defender, the free anti-spyware tool born out of Microsofts December 2004 acquisition of Giant Co., has hit the gold milestone, but Windows 2000 users might want to start looking for alternative protection. At the RSA Europe conference in Nice, France, Microsoft announced the general availability of Windows Defender for Windows XP users and made […]

Microsoft Provides Peek at Spyware Detection Data

In the first three months after shipping the Windows Defender Beta 2 anti-spyware application, Microsoft detected 22 million pieces of adware/spyware programs, resulting in roughly 14 million removals. According to statistics released by the Redmond, Wash., software maker, more than 60 percent of Windows Defender users opt to remove the ad-serving programs when offered a […]

Microsoft: Bot, Trojan Infections High; Rootkits Low

New statistics from Microsofts anti-malware engineering team have confirmed fears that backdoor Trojans and bots present a “significant” threat to Windows users. However, according to data culled from the software makers security tools, stealth rootkit infections are on the decrease, perhaps due to the addition of anti-rootkit capabilities in security applications. The latest malware infection […]

Multiple Bugzilla Bugs Squashed

Multiple security flaws in Bugzilla could put users of the software-defect–tracking product at risk of cross-site scripting, data manipulation and data exposure attacks. According to a warning from the Mozilla Foundations open-source Bugzilla project, users should immediately upgrade to versions 2.18.6, 2.20.3, 2.22.1 or 2.23.3 to minimize the risk of malicious attacks. Security alerts aggregator […]