|
There is no greater harm than that of time wasted.
Michelangelo Buonarroti (1475-1564);
Italian architect, sculptor and painter.
- Weekly summary -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)
Madrid, May 15, 2004 - This week, Oxygen3 24h-364d has offered subscribers
the news summarized below, which can be accessed at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp
- Passwordless remote administration of SMC routers (05/10/04).
SecuriTeam has informed that several SMC routers do not close the
administration port to external users, or require access authentication. As
a result, a malicious user could compromise an organization's intranet, as
they could bypass the restrictions imposed by the router.
- Critical vulnerability in Eudora (05/11/04).
SecurityTracker has reported a buffer overflow vulnerability in the mail
client Eudora, which could allow an attacker to run arbitrary code and
compromise affected systems. This vulnerability has been detected in
versions 6.1, 6.0.3 and 5.2.1 of Eudora for Windows, and lies in the
processing of URLs that start with 'file://'.
- Update for Windows XP and Windows 2003 (05/12/04).
Microsoft has published the monthly security bulletin for May, which informs
of a vulnerability in the Help and Support Center in Windows XP and in
Windows Server 2003. The security bulletin also announces that the
corresponding update is available and advises users to install it as soon as
possible through the Windows Update web page.
- (III) The evolution of computer viruses (05/13/04).
Internet and e-mail revolutionized communications. However, as expected,
virus creators didn't take long to realize that along with this new means of
communication, an excellent way of spreading their creations far and wide
had also dawned. Therefore, they quickly changed their aim from infecting a
few computers while drawing as much attention to themselves as possible, to
damaging as many computers as possible, as quickly as possible. This change
in strategy resulted in the first global virus epidemic, caused by the
Melissa worm.
- Malware activation techniques (05/14/04).
The first types of malicious code were activated when a user executed an
infected file or, in the case of boot viruses, when the computer read an
infected floppy disk. Nowadays, the most widespread malware are Internet
worms and Trojans with the capacity to create backdoors. These ensure that
they are run whenever the system starts up by inserting a key with a
reference to the infected executable file in the Windows Registry.
NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
|
|
|
|
Posted on Sunday, 16 May 2004 @ 10:08:57 EDT by phoenix22
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 0
Votes: 0
|
|
|