Blog

November 2006

Copyright 2006, Linden Research, Inc. All Rights Reserved. A popular online multiplayer game ‘Second Life’ was shut down for a while when it was hit by a special purpose worm. The game allows the players to code the objects that can play role in the virtual game. Malicious users coded...
Earlier we were receiving reports of phishing of International bank and recently of ICICI, today we received reports of phishing sites of State Bank of India. Last week we saw new phishing attack on ICICI Bank and now today we saw phishing site targeting State Bank of India. Fraudulent sites...
To prevent unauthorized access to the kernel Microsoft is using PatchGuard in 64-bit Vista. Some third party security vendors has expressed concerns that this is making it tougher to protect customers as it is locking them out of the kernel. We at Cat believes that Microsoft as a OS vendor...
Microsoft XML Core Services XMLHTTP ActiveX Control Code Execution This vulnerability has been found in Microsoft XML Core Services. It could be exploited by a remote attacker to take control of the system. The problem is due to a memory corruption in XMLHTTP ActiveX Control. Microsoft Visual Studio WMI Object...