Ryan Naraine

Microsoft Blocks Vista Rootkit Exploit

Microsoft has blocked the attack vector used to slip unsigned drivers past new security policies being implemented in Windows Vista, according to Joanna Rutkowska, the stealth malware researcher who created the exploit. Rutkowska, who demonstrated the exploit at the Black Hat conference in August, said she tested the attack against Windows Vista RC2 x64 and […]

Spam Trojan Installs Own Anti-Virus Scanner

Veteran malware researcher Joe Stewart was fairly sure hed seen it all until he started poking at the SpamThru Trojan—a piece of malware designed to send spam from an infected computer. The Trojan, which uses peer-to-peer technology to send commands to hijacked computers, has been fitted with its own anti-virus scanner—a level of complexity and […]

Oracle Ships Mega Update for DB, Server Flaws

Oracle has shipped a monster critical patch update with fixes for more than 100 security vulnerabilities in a wide range of database and server products. The new-look bulletin, which includes CVSS (Common Vulnerability Scoring System) severity scores, patches about 120 bugs in the Oracle Database Server, Oracle Application Server, Oracle Application Express, Oracle Collaboration Suite, […]

Toshiba Issues Fix for Bluetooth Driver Flaw

David Maynor and Jon “Johnny Cache” Ellch, the two hackers at the center of a Apple MacBook Wi-Fi flaw disclosure controversy, have been credited with helping to fix a “high risk” vulnerability in the Toshiba Bluetooth wireless device driver used by several PC vendors. The duo, who blew the whistle on wireless driver vulnerabilities at […]

Vitriol Rootkit to Demo at MS BlueHat Hacker Summit

Microsofts twice-yearly BlueHat hacker summit, running Oct. 19-20, will kick off later this week with a demo of a virtual machine rootkit that can potentially be used to defeat the controversial PatchGuard technology. Dino Dai Zovi, a principal at penetration-testing outfit Matasano Security, has been invited to Microsofts Redmond, Wash., campus to showcase a hardware […]

Money Mules: The Hidden Side of Phishing

The dramatic rise in phishing and identity theft attacks includes a well-organized offline component—the not-so-innocent “money mule” recruited by fraudsters to launder stolen money across the globe. The ads appear innocently on all the major employment listing sites, offering stay-at-home positions titled “shipping manager,” “private financial receiver” or “sales representative.” These, however, are active attempts […]

Is the Botnet Battle Already Lost?

Its dress-down Friday at Sunbelt Softwares Clearwater, Fla., headquarters. In a bland cubicle on the 12th floor, Eric Sites stares at the screen of a “dirty box,” a Microsoft Windows machine infected with the self-replicating Wootbot network worm. Within seconds, there is a significant spike in CPU usage as the infected computer starts scanning the […]

Securing 100 Million Laptops

If the plan is perfectly executed, Nicholas Negropontes One Laptop Per Child project will deploy 100 million laptops in the first year. In one fell swoop, the nonprofit organization will create the largest computing monoculture in history. Wary of the security risks associated with a computing monoculture—millions of machines with hardware and software of identical […]

Moderately Critical Bugzilla Bugs Squashed

Multiple security flaws in Bugzilla could put users of the software defect tracking software at risk of cross-site scripting, data manipulation and data exposure attacks. According to a warning from the open-source Bugzilla project, users should immediately upgrade to versions 2.18.6, 2.20.3, 2.22.1 or 2.23.3 to minimize the risk of malicious attacks. Security alerts aggregator […]

Oracle Security Alerts Get Overdue Makeover

Oracle plans to make a significant change to the way product flaws are described in its security bulletins, an admission of sorts that the quarterly alerts were almost impossible to understand. Beginning with the Oct. 17 release of the scheduled CPU (Critical Patch Update), the Redwood Shores, Calif., database vendor will start adding severity scores […]