Pages

2006/04/03

Are Hackers Going Beyond Zero-Day Attacks?

*********************************************************************

___________________________ Sponsors ________________________________

Jupiterimages _____________________________________________________________________

********************************************************************* http://esecurityplanet.com/ Monday, April 03, 2006

eSecurityPlanet is part of the Earthweb network

All newsletters are sent from the domain "internet.com." Please use this domain name (not the entire "from" address, which varies) when configuring e-mail or spam filter rules, if you use them.

********************************************************************* ********************************************************************* TRENDS *********************************************************************

1. Are Hackers Going Beyond Zero-Day Attacks? eSecurityPlanet Columnist Ken van Wyk was surprised by the sophistication of a recent phishing attack. Will hackers soon be moving beyond zero-day attacks into 'neg-day' attacks?

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,inga,hghq,2ezm,3q9m

------------------------------------------------------------ 2. VM Rootkits: Dangerous, in Theory Some hackers are itching at the prospect of virtual machines to do their bidding. But for now the cards appear to be stacked against them.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,1kom,3784,2ezm,3q9m

------------------------------------------------------------ 3. Track Your Laptop Anywhere…Or Not Synet's nTracker Laptop/Desktop Anti-Theft software is designed to help bring a stolen laptop home. But don't reach for your wallet yet -- the product didn't fare so well in our tests.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,ak26,8l8q,2ezm,3q9m

------------------------------------------------------------ 4. F-Secure Names Smartphone Spyware Trojan Commercially available FlexiSPY is first app to let users secretly monitor calls and SMS messages on a smartphone, leading anti-virus firm to label it malicious code and take action.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,317,5yny,2ezm,3q9m

------------------------------------------------------------ 5. 4/3: Spybot-GEN Worm Opens Back Door W32-Spybot-GEN is a worm that opens a back door on the compromised computer.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,lw5x,f6ni,2ezm,3q9m

------------------------------------------------------------ 6. 4/3: Feebs-Q Worm Uses File Sharing W32/Feebs-Q is a worm for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,csbm,5x5p,2ezm,3q9m

------------------------------------------------------------ 7. 4/3: Bancos-YK an Internet Banking Trojan Troj/Bancos-YK is an internet banking Trojan for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,iid8,5278,2ezm,3q9m

------------------------------------------------------------ 8. 4/3: Keylogger-Mose Trojan uses Rootkit Keylogger-Mose is a Trojan horse that logs keystrokes and uses rootkit techniques to hide its files, registry entries and processes.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,fx0r,6q2j,2ezm,3q9m

------------------------------------------------------------ 9. 4/3: Bloodhound-Exploit-62 Finds Access Flaw Bloodhound-Exploit-62 is a heuristic detection for multiple Microsoft Access 2003 malformed database file buffer overflow vulnerabilities.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,bpht,84eg,2ezm,3q9m

------------------------------------------------------------ 10. 4/3: Secefa-D Worm Has Back Door Ability W32.Secefa-D is a worm with back door capabilities that drops another threat onto the compromised computer.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,23fq,dxg2,2ezm,3q9m

------------------------------------------------------------ 11. 4/3: Mytob-HH a Mass-Mailing Worm W32/Mytob-HH is a mass-mailing worm that combines W32/Mydoom@MM functionality with W32/Sdbot.worm functionality.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,9k29,1ub7,2ezm,3q9m

------------------------------------------------------------ 12. 4/3: Mytob-GH a High-Functioning Worm W32/Mytob-GH is a mass-mailing worm that combines W32/Mydoom@MM functionality with W32/Sdbot.worm functionality.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,fsmr,8zr1,2ezm,3q9m

------------------------------------------------------------ 13. 4/3: Dermon-I a Password-Stealing Trojan Troj/Dermon-I is a password-stealing Trojan for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,3yjw,87qs,2ezm,3q9m

------------------------------------------------------------ 14. 4/3: IRCBot-GX an IRC Backdoor Trojan Troj/IRCBot-GX is an IRC backdoor Trojan for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,g0mm,4yfr,2ezm,3q9m

------------------------------------------------------------ 15. 4/3: BankDL-AP a Downloader Trojan Troj/BankDl-AP is a downloader Trojan for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,l9mv,ci93,2ezm,3q9m

------------------------------------------------------------ 16. 4/3: Rbot-CTJ Worm, Trojan Still Spreading Security vendor Sophos has issued the second alert in less than a week for W32/Rbot-CTJ, a worm and IRC backdoor Trojan for the Windows platform.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,a8sx,cld,2ezm,3q9m

------------------------------------------------------------

*********************************************************************

/-------------------------------------------------------------------\

Jupiterimages - your search ends here Jupiterimages offers online subscriptions and single image downloads for clipart, Web graphics, photos, footage and music (including flash versions) via a comprehensive network of design-oriented Web sites for industry professionals and individual consumers. See what you're missing. Go to: http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,dh1n,3138,2ezm,3q9m

\--------------------------------------------------------------adv.-/

********************************************************************* PRODUCTS AND SERVICES *********************************************************************

********************************************************************* VIEWS *********************************************************************

1. Updating our Thinking on Software Updates eSecurityPlanet columnist Ken van Wyk looks at the issue of software updates -- particularly the lack there of for mobile devices.

http://nl.internet.com/ct.html?rtr=on&s=1,2cgf,1,ll7n,mfcu,2ezm,3q9m

------------------------------------------------------------

********************************************************************* Earthweb.com's Family of Online Services for IT Insiders *********************************************************************

IT MANAGEMENT http://itmanagement.earthweb.com/ HARDWARE & SYSTEMS http://hardware.earthweb.com/ NETWORKING & COMMUNICATIONS http://networking.earthweb.com/ WEB DEVELOPMENT http://webdeveloper.earthweb.com/ SOFTWARE DEVELOPMENT http://softwaredev.earthweb.com/

Get the latest technical tips, tools, and resources via Earthweb's extensive collection of free e-mail newsletters!

*********************************************************************

You are subscribed to the eSecurity Planet newsletter as news-and-stuff@arconati.us. To unsubscribe from eSecurity Planet please send an email to: u-1ab8f-1b8622a7ba-1768@nl.internet.com

To manage your newsletter subscription preferences, visit this location: http://nl.internet.com/profilepage.html?uid=1b8622a7ba&eid=14137669

To unsubscribe via postal mail, please contact us at:

Jupitermedia Corp. Attn: Newsletter Subscription Dept. 475 Park Avenue South New York, NY 10016

Please include the email address which you have been contacted with.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This email is powered by EmailLabs (http://www.emaillabs.com) Contact us for a FREE demo

No comments:

Post a Comment

Keep a civil tongue.