by Alex Eckelberry | Mar 31, 2010 | Uncategorized
Didier Stevens, security professional and blogger, has found a “feature” in the PDF file format that makes it possible to package an executable in a PDF file which will run in Foxit PDF reader or run in Adobe Reader with a bit of social engineering.“With Adobe Reader,...
by Alex Eckelberry | Mar 30, 2010 | Uncategorized
MS10–018If you’re using Internet Explorer versions 6 or 7 it wouldn’t be a good idea to miss this one. “Actively exploited” for drive by down loads from malicious web sites sums it up.There’s something in it for IE8 as well.See our...
by Alex Eckelberry | Mar 30, 2010 | Uncategorized
There are a couple of programs in circulation at the moment designed to steal Steam account login credentials. People can have a lot of money invested in Steam purchases (if you purchase PC games online Steam is probably the best digital delivery service around), and...
by Alex Eckelberry | Mar 30, 2010 | Uncategorized
There seems to be an established procedure used by government officials who want to censor Internet traffic: begin requiring Google and ISPs to filter pornography then sneak in filtering of the politically sensitive material of your choice.Maybe we should give this a...
by Alex Eckelberry | Mar 30, 2010 | Uncategorized
Facebook is working on filtering a piece of nuisance malware that poses as a “Facebook antivirus” application that — when it’s installed — puts several dozen photos on a victim’s Facebook wall and tags their friends in them. Once their friends click on the...