exploit

Fri
18
Feb
Dennis Faas's picture

Microsoft Confirms Zero Day Exploit, Downplays Risk

Microsoft says it's unlikely that hackers will successfully exploit a recently discovered security bug in Windows. The company says that if the bug is abused, it would likely result in a denial of service attack instead. As noted on Wednesday, the ... problem involves system files related to Windows network file and printer sharing. Hackers are often particularly interested in exploiting such system files as they are a potential entry point between a networked computer and the outside world (via the Internet). Denial of Service Risk to Windows In this case, the Windows exploit appears to have two ... (view more)

Wed
05
Jan
Dennis Faas's picture

New Windows Exploit Opens Door to Total System Takeover

Microsoft has confirmed that a zero-day vulnerability exists in Windows XP, Vista, as well as Server 2003 and Server 2008. The bug, which first emerged in mid-December 2010, has evolved since the exploit was posted publicly. The bug was first ... discussed on December 15 at a security conference in South Korea. Since no one had yet exploited the vulnerability, there was not significant cause for concern. That's changed now that researcher Joshua Drake has released an exploit module via open-source penetration testing project, Metasploit. Exploit Opens Door to Total System Takeover Metasploit has ... (view more)

Wed
21
Jul
Dennis Faas's picture

New 'Windows Shortcut Flaw' High Risk, Affects All Users

A new Windows zero-day flaw has gone public. Known as the "Windows Shortcut flaw", the exploit affects all versions of Microsoft Windows. What's important to note is that merely opening or viewing an infected USB stick can infect a computer -- even ... on systems where Windows Autoplay is disabled. The flaw affects files which have the file extension .LNK, otherwise known as a "Windows Shortcut" file. Shortcut files are essentially copies of program icons and tell Windows where the original program is located. For example, normally one would have to click Start -> Programs ... (view more)

Thu
10
Sep
Dennis Faas's picture

Networking Bug Bad Publicity For Windows 7 Launch

Microsoft has confirmed a serious security issue affecting Windows 7 Release Candidate (RC) -- the version that was made available to the public prior to the full release of Windows 7. The problem also currently affects Windows Vista and Server ... 2008, but not Windows XP or Server 2008 R2. The issue involves the Server Message Block (SMB) system which is a part of Windows itself and is used for sharing files over a network. A bug in the system means anyone could take advantage of the exploit and use SMB to gain remote access to (and take control of) a remote computer. Temporary Solution: Block ... (view more)

Wed
09
Sep
Dennis Faas's picture

Zero-day Attack

A zero-day or "0day" attack is a computer threat that tries to exploit computer application vulnerabilities for which no security fix is yet available. Zero-day exploits are used by attackers before the software vendor knows about the vulnerability. ... The term derives from the age of the exploit. When a vendor becomes aware of a security hole, there is a race to close it before attackers discover it or the vulnerability becomes public. A "zero day" attack occurs on or before the first or "zeroth" day of vendor awareness, meaning the vendor has not had any opportunity to disseminate a security ... (view more)

Fri
29
May
Dennis Faas's picture

Click Carefully: New DirectX Exploit in the Wild

Another remote hacker threat has arisen, and this time it affects popular streaming media tool DirectX. Microsoft announced yesterday that it is currently working on a fix for the security exploit, which could allow someone to take total control of ... a system by using malicious QuickTime video files. DirectX Exploit: Affected Users The exploit involves Microsoft's audio/video sourcing/rendering software DirectShow and the way it handles the QuickTime format files it supports. Users of Windows 2000 Service Pack 4, Windows Server 2003, and Windows XP are those most affected and will want to keep ... (view more)

Mon
04
May
Dennis Faas's picture

Malware

Malware (a portmanteau of "malicious software") is any software program developed for the purpose of causing harm to a computer system, similar to a virus or Trojan horse. Malware can be classified based on how it is executed, how it spreads, and/or ... what it does. The classification is not perfect, however, in the sense that the groups often overlap and the difference is not always obvious, giving rise to frequent flame wars. Overuse of the term 'Virus' Because viruses were historically the first to appear, the term "virus" is often applied, especially in the popular media, to all sorts of ... (view more)

Thu
03
Jan
Dennis Faas's picture

Spyware Goons Exploit Benazir Bhutto's Death

Think CNN and the major network news agencies are the only ones quick to jump on breaking international events? Think again. Only hours after the tragic announcement of the assassination of former Pakistani Prime Minister Benazir Bhutto, malware ... creators had already crafted an exploit to take advantage of curious web users. A number of security companies are reporting the widespread exploit, including McAfee, Symantec, and WebSense. According to this group, at least ten sites on Blogger.com (Google's primary blog service) were, as of the day of Bhutto's assassination, spreading a fake video ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Mon
22
Aug
Dennis Faas's picture

Malware

Malware Malware , or "malicious software" is a generic term used to describe various types of malevolent programs. Below are some of the most common forms of malware. Virus Viruses have used many sorts of hosts. When computer viruses first ... originated, common targets were executable files that are part of application programs and the boot sectors of floppy disks. More recently, most viruses have embedded themselves in e-mail as Email attachments, depending on a curious user opening the viral attachment. In the case of executable files, the infection routine of the virus arranges that ... (view more)

Pages

Subscribe to RSS - exploit