Nov. 11, 1999 Patch Available for "scriptlet.typelib/Eyedog" Vulnerability Microsoft has released a patch that eliminates security vulnerabilities in two ActiveX controls. The net effect of the vulnerabilities is that a web page could take unauthorized action against a person who visited it. Specifically, the web page would be able to do anything on the computer that the user could do.
Frequently asked questions regarding this vulnerability Business Continuity Planning and Preparation for Disasters
About the CIH VirusYesterday and today April 26, 1999 we have received a number of requests for information about the virus for this reason we are posting the information below
Once the virus is triggered the first 2048 sectors of each hard drive in the computer are overwritten with random data. This area of the hard drive contains important information about the files on the computer. Without this file information the computer will think the hard drive is empty. The virus will also write one byte of data to the BIOS boot block which is critical for booting a computer. Writing to the system BIOS can be prevented by setting a jumper on most motherboards. Contact the computer vendor or motherboard vendor for assistance with their product. If the virus succeeds in reprogramming the flash BIOS ROM, there is no software remedy for it: your PC will no longer be bootable and the flash BIOS will need to be replaced or re-programmed in a special EEPROM programming device. Where the flash BIOS ROM is permanently attached to the motherboard, the entire motherboard will need replacing. The damage caused to the information on the hard disk is possibly recoverable by using data recovery services, and the success depends on the disk size, format, fragmentation etc. Volunteer opportunities through the Disaster Center Disaster Center Bulletin Board Directory.
Computer Virus Bulletin Board: For the latest Emergency related news and notices
How quickly the Web community reacts... Late yesterday evening, Symantec released an unsigned patch containing the file 'PIFTS.EXE'. Because the file was unsigned, it caused firewall alerts in Norton Internet Security and Norton Antivirus when the file attempted to access the Internet. It's not yet been revealed exactly what the purpose of the file was, but it's actions were to create a URL consisting of version information for certain Norton products. But though the actions of the file were pretty benign, reactions from users were anything but calm. Instead, spammers immediately began flooding Symantec forums, theory crafting many evil scenarios, leaving nonsense posts, and generally creating havoc. That led to Symantec deleting the threads, which in turn led to even more conspiracy theories and finger pointing.
Of course, malware distributors were quick to pick up on the controversy and immediately began seeding malware through search engines by posting links to malicious files using the keyword 'PIFTS.EXE'.
Symantec has since issued the following statement, which will hopefully put fears to rest and warn folks away from malware links appearing on search engine results pages:
Symantec released a diagnostic patch "PIFTS.exe" targeting Norton Internet Security and Norton Antivirus 2006 & 2007 users on March 9, 2009. This patch was released for approximately 3 hours (4:30 - 7:40 PM March 9, 2009 Pacific Time). In a case of human error, the patch was released by Symantec "unsigned", which caused the firewall user prompt for this file to access the Internet. The firewall alert for the patch caused understandable concern for users and began to be reported back to Symantec. Releasing a patch unsigned is an extremely rare occurrence that does not pose any security issues to our users. The patch reached a limited number of Norton customers and has subsequently been pulled from further distribution. Norton users are fully protected and do not need to take any action as a result of this issue.
Three things are clear to me from this incident. One - never, ever release an unsigned file if you're a security/firewall vendor. Two - Symantec's presence is so vast that even the simplest mistake can become an Internet sensation in mere hours. And three - malware distributors will miss no opportunity to capitalize on an event in order to do harm.
Is Firefox really safer than Internet Explorer?
Monday March 9, 2009
The short answer to the Firefox safety question is, "Well, yes, but..."
The longer answer is that out of the box (i.e. freshly installed), Firefox isn't really any safer. Like Internet Explorer, Firefox is prone to its own share of security vulnerabilities and exploits. However, if you add the free NoScript addon for Firefox and you disable Firefox http header refresh, Firefox becomes much safer than Internet Explorer or any other browser.
The Internet makes it easier to accomplish many things - banking, research, travel, and shopping are all at our virtual fingertips. But just as the Internet makes it easier for legitmate pursuits, it also makes it easier for scammers, con artists, and other online miscreants to carry out their virtual crimes - impacting our real life finances, security, and peace of mind. These Internet scams are constantly evolving - here are some of the more common tactics used.
A Patch a Day...
Chances are, there are dozens of security vulnerabilities waiting to be exploited on your system. And it's not just the latest Excel vulnerability or the Windows operating system you need to be concerned about. Adobe Flash, Acrobat Reader, Apple Quicktime, Sun Java and a bevy of other third-party apps may host security vulnerabilities waiting to be exploited. To check your system, use the free Secunia Software Inspector service at least once a month.
Antivirus information
A virus is a computer program which can duplicate itself and 'infect' other computers automatically and can cause file deletion, system corruption and even cause computers to be formatted. With 10 to 15 new viruses discovered per day, the threat is growing exponentially with leading antivirus firm McAfee stating that more than 58,000 virus threats are currently in existence.
Viruses can be spread via any transferable media whether in the form of floppy disks, CDs, email attachments or in material downloaded from the Web. The most common form of transfer is via email, in the form of an attachment which, when opened, activate a virus and infect a com
No comments:
Post a Comment