Ryan Naraine

Microsoft Confirms Jet DB Flaw, MS Word Attacks

An unpatched security flaw in Microsoft’s Jet Database Engine is being used to launch targeted attacks against Windows users, according to an advisory from the software vendor.The attacks, described by Microsoft as “very limited,” are exploiting a buffer overrun vulnerability in the lightweight database that provides data access to applications such as Microsoft Access, Microsoft […]

Sony Taking Crapware Abuse to New Levels

(See update note below) Sony sells a configure-to-order laptop. Sony preinstalls crapware (trial software, games, etc.) on that computer. Sony wants you to pay $49.99 to remove the crapware. Taking consumer abuse to new levels. UPDATE: In the face of widespread condemnation on blogs and news sites, Sony has removed the $49.99 fee.

Tech Exec Picked for Top Cyber-Security Post

Silicon Valley entrepreneur Rod Beckstrom, best known for founding Twiki.net and for his book on the power of decentralized organizations, has been tapped by the Bush administration to manage a new National Cyber Security Center.The White House announced March 21 that Beckstrom will take up an office at the Department of Homeland Security and report […]

Microsoft’s Komoku Buy Could Hit Patent Hiccup

I’m hearing some murmurs that Microsoft’s acquisition of anti-rootkit startup Komoku could hit a patent hurdle. My sources point to Patent #7,181,560, which was granted to Joe Grand (aka Kingpin from L0pht) and Brian Carrier of digital-evidence.org and covers a “Method and Apparatus for Preserving Computer Memory Using Expansion Card.” The concept covered in the […]

Microsoft Buys Rootkit Detection Startup

Looking to beef up the anti-malware protection capabilities in its enterprise and consumer security products, Microsoft has inked a deal to acquire Komoku, a U.S. government-funded startup that specializes in finding malicious rootkits. Financial terms of the deal were not released.Komoku took in about $2.5 million in funding from DARPA (the Defense Advanced Research Projects […]

Hannaford Data Breach: The Security Vendor Conundrum

Whenever a news story breaks about a major data breach, PR folks representing security vendors trip over themselves to clog my inbox with “our-solution-could-have-prevented-that” notes. For Rapid7, a company that hawks vulnerability assessment, PCI compliance and Web application scanning software, this week’s Hannaford breach flipped the script and showed how security vendors scramble to deal […]

Attack Code Posted for CA BrightStor Flaw

Hackers have posted proof-of-concept code that could be used to launch code execution attacks against businesses using the CA BrightStor ARCserve Backup software product.eWEEK has confirmed that the code, posted at Milw0rm.com, exploits an unpatched ActiveX vulnerability in CA BrightStor ARCserve Backup to launch client-side attacks on laptop and desktop computers.The attack code was successfully […]

Apple Ships Mac OS X Mega Update

It’s officially Patch Day in the land of the Mac.On the heels of the release of Safari 3.1, with patches for more than a dozen browser vulnerabilities, Apple has shipped a mega update for its flagship Mac operating system, fixing at least 80 documented vulnerabilities in a wide range of core components.The Security Update 2008-002, […]

Apple Patches 13 Safari Browser Vulnerabilities

Apple has shipped a new version of its flagship Safari Web browser to fix more than a dozen security vulnerabilities affecting both Windows and Mac users.The new Safari 3.1 includes patches for at least 13 documented flaws, including one that puts Mac OS X users at risk of drive-by code execution attacks.According to an advisory […]

‘Critical’ ActiveX Flaws Haunt Adobe Designer

The United States Computer Emergency Readiness Team has issued a warning for multiple ActiveX buffer overflow vulnerabilities affecting Adobe’s Form Designer and Advanced Form Client software products.The flaws, rated “highly critical” by Secunia, could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.A malicious attacker could use specially rigged HTML documents […]