Profile of Gregg Keizer
News & Commentary Posts: 1659
Articles by Gregg Keizer
posted in April 2005
A pair of research reports arrived at the grim conclusion that profitable malicious software can be constructed, deployed, and managed as efficiently as profitable security software.
Trend Micro is still suffering financial and customer relations repercussions nearly a week after issuing a faulty virus definition file that caused customers' PCs to slow to a crawl.
Misspelled domains have been used by the scabrous almost since URLs were created. Pornographers were among the first to adopt the tactic of registering domains that are slightly off legitimate sites' spelling, or play off confusion between. .com and .gov.
Hackers will keep cranking out exploits that take advantage of known software vulnerabilities because, although patches are available, a minority of machines are fixed, security vendor McAfee said Monday.
E-mailed worms are posing less of a threat and Microsoft has been lucky so far, says a virus researcher in explaining why 2005 has been relatively quiet on the security front.
A Windows-enthusiast site on Thursday claimed that Microsoft's MSN group is working on a new toolbar for IE that at least one analyst thinks could boost the whole browser-as-moneymaker idea.
Government Accounting Office says lack of security controls means the IRS might not even know if an identity breach has already occurred.
Spammers are mining peer-to-peer networks for addresses and finding it lucrative work, a security expert says.
Symantec releases a free beta of its integrated security suite that for the first time includes a full-featured anti-spyware component.
Mozilla's browsers have been patched against a half dozen or more vulnerabilities, the open-source group responsible for producing the popular Firefox and the older Mozilla suite said late last week.
Reuters' instant messaging service, purposefully taken offline by the U.K.-based firm Thursday in a last-ditch effort to stymie a fast-spreading IM worm, was back in operation early Friday morning.
The hacker equivalent of a cloak of invisibility may cause serious problems for users and anti-virus vendors, a security expert says.
Blogs aren't just for blabbing to friends and family, but increasingly are being used as a safe haven by hackers for storing and distributing malicious code.
A bug in Microsoft's Jet Database Engine exposes data in the Redmond, Wash.-based company's Access database software, security firm Secunia said Tuesday, the same day Microsoft released a slew of vulnerability warnings for Windows, Office, Exchange and MSN Messenger.
Microsoft on Tuesday rolled out eight security bulletins encompassing 18 vulnerabilities and their patches, seven of which the vendor dubbed "critical."
Since its debut about six weeks ago, 40 Mytob variants have appeared, a new record for a worm. The writers are trying to get it past anti-virus defenses by constantly tweaking it. Two sites offer free removal tools - Symantec and Sophos.
Microsoft will release eight patches for Windows, Office, Exchange, and MSN Messenger, at least half of which will be marked "critical," the company said late Thursday.
A new breed of profit-motivated worm and virus writers is training their sights on nondesktop platforms, particularly cell phones.
The DNS cache poisoning that first struck more than a month ago and led to users being redirected from popular Web sites to malicious sites that infected their machines with spyware is continuing.
Security threats exploiting instant-messaging and peer-to-peer clients jumped by more than 270% in the past year, a group of IM providers and security firms say in a first-ever report.
More than 70% of virus writers are now writing spyware under contract, one more piece of evidence that hacking has evolved from mischievous hobby to money-making criminal venture.
Symantec will push a new spyware/adware risk model from its enterprise software to its consumer line, the company said.