| Metasploit, NeXpose Integrate for Enterprise Security Testing By Sean Michael Kerner - December 2, 2009 Rapid 7 is now integrating popular open source exploit framework into a more enterprise-friendly suite for vulnerability scanning. Group Finds Privacy Holes in Digital Health Records By Kenneth Corbin - December 2, 2009 Patient Privacy Rights group issues report card showing wide variations in privacy safeguards in electronic health offerings. Facebook Revamps Privacy Approach Yet Again By Kenneth Corbin - December 2, 2009 Social networking leader moves away from network-based approach to privacy, gives users more precise control over what's shared. McAfee Locks Down Removable Devices By Larry Barrett - December 1, 2009 Security software-maker serves up unified, end-to-end security options for the enterprise. Bug Confirmed in Older IE Browsers By Stuart J. Johnston - November 25, 2009 Microsoft confirmed that a security hole in older versions of Internet Explorer is a real threat that the company is taking seriously. 2009's Malware May Reveal 2010's Threats By Sean Michael Kerner - November 23, 2009 In 2009, new malware mechanisms have emerged and platforms beyond Windows have increasingly been targeted. 12/3: W32.SillyFDC.BBX Spreads to Removable and Mapped Drives By eSecurityPlanet Staff - December 3, 2009 This worm spreads by copying itself to removable and mapped drives. Get Ready for Windows 7! Pros and Cons? Learn What Our Experts Think Download Free eBook Now. Click Here. | Interested in placing your TEXT AD HERE? Click Here 12/3: Adware Installs as Browser Search Plugin By eSecurityPlanet Staff - December 3, 2009 Adware.Zwunzi is an adware program that installs itself as a Browser Search Plugin for Internet Explorer and Mozilla Firefox. 12/3: FakeAV-BY Associated with Rogue Security Software By eSecurityPlanet Staff - December 3, 2009 FakeAV-BY is malware with attributes associated with rogue security software. 12/3: Agent-LWY Steals Confidential Information By eSecurityPlanet Staff - December 3, 2009 Agent-LWY is a Trojan for the Windows platform. Troj/Agent-LWY includes functionality to: run automatically, steal confidential information, and access the Internet and communicate with a remote server via HTTP. 12/2: Trojan.Vundo!gen2 Heuristic Detection By eSecurityPlanet Staff - December 2, 2009 This heuristic detection includes members of the Trojan.Vundo family. 12/2: EncPk-MC Malicious Executable By eSecurityPlanet Staff - December 2, 2009 Mal/EncPk-MC is a malicious executable, often in the FakeAV family of malware. 12/02: Voterai-A Attacks Through Removable Storage Devices By eSecurityPlanet Staff - December 2, 2009 The Voterai-A virus spreads by copying itself to removable storage devices. 12/2: Trojan.FakeAV!gen9 Trojan Utilizes Packers By eSecurityPlanet Staff - December 2, 2009 This relatively low-threat Trojan is a heuristic detection for files that may have been obfuscated or encrypted in order to conceal themselves from antivirus software. It targets only Windows OS, from Windows 95 on up. 12/1: AntivirusSystemPro Reports False or Exaggerated Threats By eSecurityPlanet Staff - December 1, 2009 The misleading application may prevent a user from running any other executable, claiming that it is infected and asking the user to register the misleading application. |
No comments:
Post a Comment