Brandon

Members
  • Content Count

    550
  • Joined

  • Last visited

Everything posted by Brandon

  1. Happy Birthday Sped Have a great day..
  2. Malware authors just opened their own holiday season. We received couple of reports of a new AIM worm spreading. The worm is simple and doesn't exploit any vulnerability; instead it relies on social engineering. The user will receive the following AIM message: "This AIM user has sent you a Greetings Card, to open it visit: http://greetings.aol.com/index.pd?source=c..._card.COM" Instead of going to the AOLs site, this link actually points to a different site (http://<REMOVED>.<REMOVED>.134.156/My_Christmas_Card.COM) from which the user will download the worm. This file is a SDBot va
  3. I wonder what Sunbelt is going too do too with Kerio then its name change...
  4. I have already heard about this, and it looks cool.
  5. The U.S. Internal Revenue Service warned Americans this week about the latest online scam, which attempts to convince Internet users to give up personal information by posing as a notification of a tax rebate. The fake e-mail appears to be sent from [email protected] and informs the recipient that they are eligible to receive a tax refund, according to the warning. The scam links to an online form that asks for personal information. The fake e-mail is made more convincing, according to a report in ComputerWorld, because it uses a cross-site scripting flaw in the federal government's benefits
  6. Kerio Technologies Acquired by Sunbelt Software
  7. Online trading company Scottrade has warned its customers that data thieves compromised the systems of its electronic checking provider last month, resulting in a major leak of personal information. The financial services company said in a statement dated November 11 that its eCheck Secure service provider TROY Group had acknowledged being compromised. However, at least some Scottrade clients did not get a notice about the breach until last week, according to posts on FatWallet. "On October 25, 2005, Troy Group ... reported to us that a computer hacker had compromised its eCheck Secure servers
  8. This SANS Top-20 2005 is a marked deviation from the previous Top-20 lists. In addition to Windows and UNIX categories, we have also included Cross-Platform Applications and Networking Products. The change reflects the dynamic nature of the evolving threat landscape. Unlike the previous Top-20 lists, this list is not "cumulative" in nature. We have only listed critical vulnerabilities from the past year and a half or so. It includes step-by-step instructions and pointers to additional information useful for correcting the security flaws. We will update the list and the instructions as more cri
  9. Security researchers have published a zero-day exploit for Internet Explorer this week that allows remote code execution on most variants of Windows. The vulnerability targeted by the exploit was originally announced in May as a stability issue resulting in the browser closing. With the release of the exploit code, however, security researchers have demonstrated that malicious code can be remotely executed after convincing a user to click on a link. The public proof-of-concept exploit launches the Calculator included with Windows; however this could be easily modified to more malicious executa