Related links:El Virus Es Un MicoorganismoBee VirusRemoving VirusVirus Scan Windows Partition Using LinuxRecent Comp Virus AlertsAids Virus PicturesFix My Virus
Fake Microsoft e-mail contains Trojan virus (CNET) by CNET: Yahoo! Tech
Site Navigation
HomeTech Categories
Camcorders
Car Tech
Cell Phones
Desktops
Digital Cameras
Games & Gear
HDTV & Televisions
Home Audio Define Computer Virus Protection Comparison & Speakers
Home Video
Laptops
Monitors
MP3 Players
PDAs
Printers
Scanners
Software
Storage
Upgrades
Wi-Fi & Networking
Blogs
Tech Shows
My Tech
News
Today In Tech > Oxford and Cambridge join iTunes U
<< See all Yahoo! Tech News
Fake Microsoft e-mail contains blackmail virus Trojan virus (CNET)
Posted on Tue Oct 14, 2008 11:10PM EDT
Add articles about technology to your My Yahoo!
AT&T delete winworm32 virus drops Dish for DirecTV A slice of life: Live Webcast set for C-section Pandora says Net radio vote is too close to call Google opposes anti-gay marriage measure More Technology News
See More News at CNET
Recent Tech virus sofware News Stories
AT&T current virus epidemics seeks to make more anti virus software non-phone gadgets wireless
San Francisco Chronicle Wednesday 15th October, 02:40:57 PM
AT&T seeks to make more non-phone gadgets wireless
Miami Herald Wednesday 15th October, 02:07:33 PM
AT&T seeks to make more non-phone gadgets wireless
The State Wednesday 15th October, 02:20:19 PM
Recent Articles About Technology
FCC overhaul eyes broadband but could raise bills (AP)
FCC chair eyes fallow TV airwaves for broadband (AP)
EBay posts 3Q profit, but outlook below forecasts (AP)
Microsoft attempts to sour Apple's laptop launch (AP)
FCC chairman backs use of 'white space' spectrum (CNET)
Obama buys first video game campaign ads (Reuters)
SanDisk Stresses Convenience as SlotMusic Cards Debut (NewsFactor)
AT&T seeks to make more non-phone gadgets wireless (AP)
Mozilla Releases Firefox 3.1 Beta 1 for Public Testing (NewsFactor)
Opera's cmv virus MAMA Tells Devs What's Behind the Web (PC Magazine)
Cisco, Tata open public video conferencing rooms: company (AFP)
EA Chief Disliked 'Spore' DRM, full releases virus Too (PC Magazine)
- Along with the vulnerabilities that Microsoft patched Tuesday, the software giant's customers have a new problem to grapple with: a fake notification e-mail that looks remarkably legitimate.
Attackers are apparently taking advantage of Microsoft's Patch Tuesday to send legitimate-looking e-mails that include a Trojan virus. Trojan.Backdoor.Haxdoor allows attackers to execute files and steal information from compromised computers. The fake mailing kaspersky virus scan software includes a legitimate-looking PGP signature, as well yahoo messenger virus as purporting to come from a real Microsoft employee.
Christopher Budd, a security program manager in the Microsoft Security Response Center, offers this perspective on the e-mails in a slipknot the virus of life mp3 security posting:
We received free virus protection programs some questions from customers about an e-mail that's circulating that claims to be a security e-mail from Microsoft. The e-mail comes with an attached executable, which it claims is the latest security update, and encourages the recipient to run the attached executable so they can be safe. While Brain Eating Virus Southwest malicious e-mails posing as Microsoft security notifications with yahoo anti virus free spyware attached malware aren't new (we've seen this problem for several years) this particular one is a bit different in that it claims to be signed by our own Steve Lipner and has what appears to be a PGP signature block attached to it. While those are clever attempts to increase the credibility of heartburn bacteria or virus the mail, I can tell you categorically that netsky virus this is not a legitimate e-mail: it is a piece of malicious haunta virus spam and the attachment is you got a virus malware. Specifically, it contains Backdoor:Win32/Haxdoor."
Dancho Danchev at ZDNet's Zero Day ponders whether the timing of windows virus protection this malware campaign will affect its success rate.
"Compared to the recent targeted malware attack against U.S schools, and the massive fake CNN news items campaign taking advantage of client-side vulnerabilities, this one is definitely going west nile virus symptom to have a lower virus doctors success Road Runner Anti Virus Spyware rate--no matter the virus protections timing," Danchev macafee anti virus torrent writes.
Microsoft's October 2008 security bulletin included four critical bulletins concerning Windows, Internet Explorer, Microsoft Host Integration Server, and Free Download Virus Eraser Microsoft Excel.
Product Categories
Computers
Home Office
Wi-Fi & Networking
Phones & PDAs
Cameras & Camcorders
TV & Home Theater
Portable Audio
Upgrades
Desktops
Laptops
Software
Storage
Scanners
Monitors
Printers
Home Networking
PDAs
Cell Phones
Camcorders
Digital Cameras
Home mysteryville virus Audio & Speakers
Home Video
Televisions
Games & Gear
MP3 Players
Car Tech
Today On...
Consumer Reports
Don't Buy Without pop-up virus removal Them
For vundo virus payload unbiased ratings and largemouth bass virus effects reviews on thousands of products, get expert advice from Consumer Reports. Read More
Yahoo! Search
Play full songs for free
Search for music artists and listen to full songs right on the search page. Try it now. Read More
Sponsored trojanhorse virus removal tool Links
Laptop Sale at Dell.com
Select Laptops Starting at $499. Powered By Intel® Centrino® Duo.
www.Dell.com
HP Laptop Computers
Learn returned mail virus More About HP Laptops - Compare Products & Prices unix server anti virus Now.
www.hp.com
Laptop at Circuit City
Circuit City - Official Site. Free Shipping on Orders $24 and buy virus Up.
www.CircuitCity.com
Laptops
Save on Laptops at Staples®. Shop Online or In-Store.
www.Staples.com
My Tech
Sign In killing a trojan virus to see your profile information, saved products and more...
Register Sign In
My Saved Tech Products
Show All Quick Compare
Gadgets You Might Like
Why was I recommended these yahoo virus gadgets?
Lexmark X5650 Multifunction Printer
Apple Time Capsule - 500 GB wireless hard drive
Corinex Global Corinex GameNet Bridge
OCZ Technology OCZ Reaper HPC Edition Dual Channel Computer RAM
Apple MacBook Dna Virus Causative Agent Air 1.6 GHz Laptop Computer 4.5/5
Recently Viewed
on | off on | off
Recent Searches
on | off on | off
Site Map | Tour | Subscribe to Yahoo! Tech
Question and Answer content at penis tip pain bacteria virus Yahoo! Tech is written by Yahoo! users at Yahoo! Answers. Yahoo! does fight epstein barr virus Virus Causing Diseases not evaluate or guarantee the accuracy of any Yahoo! Answers content. For more information, 24hour stomach virus read the Full Disclaimer.
Opinions flash drive with anti virus expressed by the Advisors are their own and do not necessarily reflect the views of Yahoo! Inc. Yahoo! receives no compensation from any manufacturer or distributor nor does it compensate any Advisor for the coverage of any product or service in any Advisor's content. |
Security Software Suites No Match for Custom Attacks - Security Fix
Security Fix
Subscribe to The
xpupdate virus Post
recent posts
Microsoft's Patch Tuesday Includes New Rating Index
Security Software
Discount Software Norton Anti Virus Cheap Suites No Match for Custom Attacks
Microsoft Stock Price Routinely Dinged by Security Patches
Phishers, Virus Writers Exploit Global Financial Crisis
Apple, Opera Ship Security Updates
Stories by Category
Cyber Justice
Fraud
From the Bunker
Latest Warnings
Misc.
New Patches
Piracy
Safety Tips
U.S. Government
Web Fraud 2.0
Stories By Date
Full Story Archive
related links
The Archives
Security Fix Live: Web Chats
About This Blog
Password Primer
7 Security Tips
Technology Section
syndicate
RSS Feed
Brian Krebs on Computer Security
About This Blog | Archives | RSS Feed (What's RSS?)
Security Software Suites No Match for Custom Attacks
The all-in-one security software suites from the major anti-virus vendors fail spectacularly at detecting custom-made malware that exploits the latest software vulnerabilities, according to testing done by computer virus trojan downloader win 32b security analysis firm Secunia.
Secunia tested how well nearly
blank screen virus a dozen security suites fared against malicious files and direct attacks that leveraged more than 150 known software flaws. All of the vulnerabilities used in the test are publicly documented -- details of them can be found in the Common Vulnerabilities and Exposures (CVE) database -- and most of the
remove usb virus
vulnerabilities can be fixed by applying a software update currently available from the program's maker.
Secunia says
homosapieus h virus that out of the 300 test cases, 126 are particularly important because they affect very popular products and have either been discovered as zero-day threats or Secunia has developed working exploits. Secunia CTO Thomas Kristensen said all of the vulnerabilities
super geek virus scan used in the test merit a moderate security rating or higher, meaning they can be used to remotely install software on the victim's PC, with little or no help from the user aside from opening or
ebola virus and name
viewing the malicious file.
The company found that nearly all of the security suites --
swizzor virus including those from McAfee, F-Secure, Microsoft and TrendMicro -- detected between just 1 percent and 3 percent of the attacks. Symantec's Norton Internet Security 2009, dramatically outperformed the rest, detecting more than 20 percent of all threats and more than 30 percent of the most dangerous threats, according to the results.
Still, that means in at least 7 out of 10 cases, the bad guys using a targeted exploit will slip past
Remove Spyware And Virus Norton's defenses. That also suggests that the other products detect roughly 3 percent of targeted attacks.
At any rate, readers can find a detailed breakdown of Secunia's test results and interesting methodology here (PDF).
I emphasize the word "targeted" because most anti-virus products are still reactive, in that they focus on protecting customers by figuring out what people are getting attacked by and then creating custom "signatures" to detect that specific threat going forward. While most anti-virus companies claim to have incorporated technology capable free anti virus software for vista of detecting programs that exhibit suspicious behavior or that attack specific software vulnerabilities, it appears that Symantec is alone in making significant strides in this respect, at least as it relates to the latest, known vulnerabilities in widely-used software.
Secunia's study is useful, but it ignores the unfortunate reality of today's threats, which rely not on software vulnerabilities but mainly on tricking people into installing software. Interestingly, Symantec itself documents this virus h5n2 fact in its Internet Security Threat Report, which found that in the second half of 2007, only 10 percent of the new malicious code threats affecting consumers used software flaws.
At
Fix My Virus the very least, Secunia's study is a stark reminder that having security software installed is no substitute for keeping the rest of the software you use up-to-date with the latest security patches. On this front, I've recommended Secunia's vulnerability scanners, which work either through the company's Web site or a free, installable program. Some readers have said they refuse to use Secunia's scanners because they require users to have Java installed, a program that needs frequent security updates itself and clutters virus check programs the user's system with old, outdated versions of itself. My take on it is that 90 percent of the planet already has Java installed. What's more, anything that raises the average user's awareness on the star virus need for regular patching is overall a good thing, Sun's clumsiness with its Java software notwithstanding.
Incidentally, if you're looking to see how well the products named in this study detect the latest threats that are actually in circulation, check out the stats released in September by AV-test.org(Microsoft Excel file). The group's battery of tests also examined how the free virus maker software suites fared in terms of system memory usage, proactive malware detection, false positive rates and on-demand scanner performance.
By Brian Krebs | October 13, 2008; 4:44 PM ET Latest Warnings , Misc.
Anti Scanner Spyware Virus Scan , New Patches , Safety Tips
Previous: Microsoft Stock Price Routinely Dinged by Security Patches | Next: Microsoft's Patch Tuesday Includes New Rating Index
Comments
Please email us to report offensive comments.
What's the most common method for targeted malware to be put into individual computers? Spam? Drive by from infected websites? Dedicated deceptive websites? Others?
Posted by: Kfritz | October 13, 2008 9:00 PM
Are we to therefore anti virus software reviews conclude that both BitDefender and Kaspersky did well in these test, i.e., did better than Norton Internet Security 2009?
Posted by: brucerealtor | October 13, 2008 9:15 PM
This points out the need for a multi-layered defense (defense in depth). Relying on just one layer such as security software is foolish. When that one layer is compromised, game over.
Instead, in a multi-layered defense, a top anti virus program system compromise may be averted by another layer.
Typical layers of defense:
1. Hardware firewall - protects the system(s) from external intrusion should the software firewall need to be turned off or is inactive for any reason. Also, how does a virus work is much more difficult to hack past than a software firewall alone.
2. Software firewall - protects the system when used outside the confines of the hardware firewall and provides outbound filtering and possible indication of malicious system activity.
3. Non-admin account - prevents system wide changes or software installation whether intentional or not (including malicious code should it get past other defenses).
4. Patch all software - prevents system compromise via bugs (especially important for Internet facing software such as browsers, e-mail clients and media players).
5. Limit amount of software installed on a system - lowers system attack surface and reduces patching.
6. Backup data on a regular basis - protects data in the event of system compromise virus scaner resulting in data loss.
7. Blocking hosts file - blocks access to known malicious websites.
And finally,
8. The human layer (computer user) as they can override all the other layers.
Posted by: TJ | October 13, 2008 10:03 PM
TJ
Thank you for that very useful list.
For those of herpes virus transmission from animals us who do not leave our systems on 24/7 [like that 'standby' option on XP, which I presume Vista
Computer Virus Myths also has] what is the advantage of a hardware firewall?
Some years back a friend of mine explained a hardware firewall by using the analogy to an incoming phone virus that attacks sony ericcson call, where the 'firewall' in effect 'takes a message' and then calls the supposed originating number back before allowing a call to connect, whereby IF the incoming call says its coming from number 202-123-4567, but when that number is called back and 'not at a working 202 exchange, the bogus communication from a phoney incoming number is prevented. We will ignore, for the purpose of this example, the ability to manipulate the number appearing on a caller ID device.
Posted by: BRUCEREALTOR |
Fake Alert Virus October 14, 2008 1:36 AM
I skimmed the 6-page PDF, and it seems that the "malware" that most of virus free nude the suites failed to detect is actually in-house Proof-of-Concept malware code provided by Secunia, not actual "in the history of influenza virus wild" malware. Testing anti-malware software against academic code isn't a real-world test IMHO.
Posted by: Angus S-F | October 14, 2008 1:46 AM
"what is the advantage of a hardware firewall?"
Think of virus from sports equipment it as a fence around a fort protecting every building. Whereas a software firewall would protect only a single building assuming it's turned on (doors and windows locked). Even if you have only one building, it still provides another layer of protection, in particular if for some reason the doors or windows are left unlocked as would happen when you’re either installing a fresh rogue virus copy of your operating system or troubleshooting a problem virus anime that requires disabling your software firewall. At least then, the hardware firewall would still protect your system from the outside world.
This provides more info:
http://www.webopedia.com/DidYouKnow/Hardware_Software/2004/firewall_types.asp
Posted by: TJ | October 14, 2008 12:30 PM
TJ
Thanks
I guess my question is that if my machine is for whatever reason not online,
Hepatitis D Virus Htm that seems certainly as effective as a hardware firewall, right.
I clicked on your link and thought I had hit gold under 'online' firewall testing services.
Alas, the definition of 'online' appeared. LOL
Posted by: brucerealtor | October 15, 2008 4:07 AM
kfritz - most common medium for malware attack are from "botnets". botnets are hoards of zombie computers (computers already at the mercy of malware) that push out all forms of spam, including phishing and
pemploma virus other tactics. Another common one now is embedding malicious code within legitimate ads on otherwise legitimate websites. Can't trust anything these days can ya?
Posted by: Jay | October 15, 2008 10:49 AM
TJ, let's not forget Network Intrusion Prevention Systems (NIPS) and Host Intrusion Prevention Systems (HIPS) in our layered defense model.
Posted by: Intrusion Prevention | October 15, 2008 11:27 AM
Post a Comment
We encourage users
new very bad virus to analyze, comment on and even
Rontokobro Virus challenge washingtonpost.com's articles, blogs, reviews and multimedia features.
User reviews and comments that include profanity or personal attacks or other inappropriate comments or material will be removed from the site. Additionally, entries that are unsigned or contain mobile anti virus "signatures" by someone other than structure of simian virus the actual author will be removed. Finally, we will take steps to block users who violate any of our posting standards, terms of use or privacy policies or any other policies governing this site. Please
Computer Virus Protection Comparison review the full rules governing commentaries and discussions.
Name:
Comments:
Blog Archives
RSS Feed
Subscribe to The Post
© The Washington Post Company
Filed under: by AUTHOR