Powered by Blogger.

Popular Posts Today

Beware of Cracks weakness in Internet Explorer

Written By RajaBlog on Wednesday, March 9, 2011 | 7:27 AM


Microsoft warned of a gap weakness in Internet Explorer 6.7 browser, and 8. Gap has the potential to be exploited malicious people to smuggle malicious programs when visitors access the site dangerous.

Patch to close the vulnerability is being developed. Despite the critical status, there are no plans from Microsoft to update its emergency. So far, the gap has not been exploited irresponsible party.

"Until now, the impact of the weakness was still very minimal and we have not seen any consumers who become victims or active attacks, addressed to its users," said Caelene Chmaj, a spokesman for the Microsoft Security Response Center (MSRC)). He said, however, it continues to monitor these weaknesses and to update as soon as possible.

This weakness was first reported several weeks ago by a French security company, Vupen, which was found in the HTML engine in Internet Explorer (IE).

IE7 and IE8 users may have a smaller chance to be a victim because this browser Protected Mode feature that will ask for permission to users if it will do the installation programs, launch applications, or modify the operating system components.

Microsoft emphasizes prevention to professional users. They suggested using the Enhanced Experience Mitigation Toolkit 2.0 (EMET 2.0) to increase the defense effort in the browser. These additional programs for free download at the Microsoft site.
7:27 AM | 0 komentar | Read More

Last year the Top 5 Threats


Growth variants threat or the threat of computer viruses and the like increasingly sophisticated and widespread. Not only intended for one platform only, but to other operating systems besides Windows. This becomes the cause of the increase in activity associated with the virtual world.

Level growing threats in various forms to reach a high level and almost predictable even endanger human life will trigger a cyber war. Stuxnet virus, for example, into the SCADA system commonly used in various infrastructure facilities such as power plant automation systems, industrial machinery, and so forth. In fact, Stuxnet also infiltrate into the office of Iran's nuclear facilities and potentially a small error may trigger a nuclear danger.

Here are the top 10 malware roaming in cyberspace Indonesia that successfully detected by ESET Threat Sense Lab. Perhaps one of them to infect our computers.

1. Detection Percentage Win32/Conficker.AA Year 2010: 6.85%

Win32/Conficker.AA is a worm that spreads through shared folders and mobile media devices. This worm into computers by exploiting vulnerabilities in the Server Service. After Conficker.AA successful, the sending computer will perform remote control of victim computers that have been infected and downloading.

2. Detection Percentage Win32/Conficker.AE Year 2010: 6.76%

Win32/Conficker.AE is a worm that is also one of Conficker.AA variant, with the modus operandi of spreading like a way of distributing Conficker.AA

3. Detection Percentage Win32/Agent Year 2010: 3.48%

According to the description of the results of ESET NOD32 as malware malware detection is generic, which is known among the large family of malware with the user's ability to steal data from infected PCs. To do that malware is usually going menperbanyak himself then places himself in the temporary folder and add the registry keys that are similar to the malware file or similar to the results files to copy itself at random it was then put yourself in the system folders other operations so that malware can "work" in every time the system start up.

Malware is able to mutate into a series of other threat, its spread through a series of intermediaries that it's almost impossible to remove it only by using one way only. To prevent this, use a good security device with a complete anti-malware, do not forget to always patch, disable autorun, and that is not less important is, think carefully before you click anything.

4. Detection Percentage Win32/Conficker.Gen Year 2010: 3.26%

Win32/Conficker.Gen is one variant of Conficker having a similar modus operandi in infecting the victim's computer. Similarly, also exploited the same vulnerability that the vulnerability in Server Service.

5. Detection Percentage Win32/Conficker.X Year 2010: 2.97%

Threat this one is a worm that attacks a network computer and spreads by exploiting vulnerabilities in Windows operating system from Microsoft. The vulnerability specifically the RPC subsystem and can be entered remotely by an attacker. Attackers can launch attacks without using a valid identity. Threat is able to make contact with the web servers to download malicious programs that others using the domain name is not official.
7:24 AM | 0 komentar | Read More
techieblogger.com Techie Blogger Techie Blogger