Blog

Indian Cyberspace hit by Kim Jong-II Malware Mails!

 January 3, 2012

Estimated reading time: 1 minute

It has been observed that cybercriminals are using the name of the North Korean leader Kim Jong-II after his death to target Internet users. Attackers are achieving this by spamming malicious emails containing specially crafted PDF files named “BriefintroductionofKim-Jong-il.pdf” This PDF file has been found to exploit CVE-2010-2883 and CVE-2010-3333...

Security Advisory for Adobe Reader and Acrobat!

 December 18, 2011

Estimated reading time: 1 minute

A critical vulnerability has been identified in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. This vulnerability (CVE-2011-2462) could cause a crash and potentially allow an...

How You Can Protect Your Website!

 December 8, 2011

Estimated reading time: 2 minutes

It is seen that more and more people are creating websites to market their products. This is a wise move since running your own website will certainly help in getting more customers to purchase your products. But unfortunately, in addition to the customers, hackers too are attracted towards such websites....

25 Worst Passwords of 2011

 November 27, 2011

Estimated reading time: 1 minute

A password is a secret word or a string of characters that is used for authentication, to prove identity or to gain access to one’s laptop, Facebook, Gmail, LinkedIn and many more similar accounts. Choosing “password” as your online password is not a good idea. In fact, it’s the worst...

Phone Text Message Lottery Scam

 November 23, 2011

Estimated reading time: 2 minutes

It is seen that Advance-Fee Fraud i.e. a confidence trick to earn money is being used by scammers sending phone text (SMS) messages as a means of tricking new victims. These text messages claim that the recipient has won a substantial sum of money in an online lottery as shown...

Firefox 8 released!

 November 10, 2011

Estimated reading time: 2 minutes

Mozilla announced today the official release of Firefox 8, a new version of the popular open source web browser. The modest update introduces a few new features and brings a number of minor improvements to the browser’s underlying HTML renderer. The built-in search box in Firefox’s navigation toolbar has been...

Microsoft announces workaround for the Duqu exploit

 November 5, 2011

Estimated reading time: 1 minute

Microsoft has posted a security advisory 2639658 to address the recently disclosed Windows kernel vulnerability (CVE-2011-3402) exploited by the Duqu malware. Microsoft has determined the flaw is in the processing of embedded True Type Fonts (TTFs). According to Microsoft: “The attacker could then install programs; view, change, or delete data;...

FedEx Scam spreading Rogueware

 October 31, 2011

Estimated reading time: 2 minutes

Today we received a mail which pretends to have come from FedEx and it looks as shown below. As seen from the image, the attachment is actually a UPX packed executable file which looks like an invoice document. After execution of the binary, it dropped a copy of itself and...

Microsoft Kills Off a Botnet!

 October 4, 2011

Estimated reading time: 1 minute

In the battle against Internet Scammers, Microsoft opened a new front using the power of a U.S. court to deal a knockout blow to an emerging botnet and taking a provider of free Internet domains offline. Microsoft got the order from the U.S. District Court for the Eastern District of...

Firefox 7 released!

 September 29, 2011

Estimated reading time: 2 minutes

Mozilla, a global non-profit organization dedicated to making the web better, released an update to Firefox for Windows, Mac and Linux. Mozilla Firefox provides a speedy web browsing experience for users and has released new tools to help developers create faster websites and web apps. Firefox manages memory more efficiently...