Archive for the 'Computer Security' Category

Analysis of the Conficker Worm

Sunday, June 21st, 2009

Computer SecurityBack in March, there was some concern about the Conficker worm. The linked article has a very readable overview of the worm, its history, what happened on April 1st, and what it’s up to now.

Link: http://www.newscientist.com/…

Beware of the Gumblar Worm

Wednesday, June 10th, 2009

Computer SecurityThere’s a new virus/worm out, and it’s taking the web by storm. Here’s how it works:

  1. You visit an infected site that has a malicious script.
  2. The script takes advantage of bugs in Adobe Reader and Adobe Flash to infect your system with a virus.
  3. If you have any FTP programs installed on your computer, the virus gets the login credentials, connects to the sites, and infects those websites with the script. This means that anyone visiting -your- site will now be infected.
  4. Whenever you use Internet Explorer to visit Google, you are redirected to a different site, possibly to activate pay-per-click advertisements.

To protect against Gumblar, do the following:

  1. Install the latest version of the Adobe Reader.
  2. Install the latest version of Adobe Flash Player. (Note, there’s one version for Internet Explorer and another version for all other browsers—you may need to install both.)
  3. Update your antivirus software and definitions, then run a virus scan.

For those who have FTP programs installed with saved passwords, I suggest (1) configure your FTP client so it doesn’t save the passwords, and (2) change the passwords. Also, this article explains how to determine if your website is infected and lists methods to remove the malicious code.

Link: http://www.itworldcanada.com/…

A Bad Backup Strategy #2

Wednesday, May 20th, 2009

Computer SecurityHere at the Chad’s News network command center, we do external site/database backups on a weekly basis. The website in the linked article maintained a backup server but did not create an external or off-site backup. A hacker broke into their system and destroyed the data on both servers. Thirteen years of irreplaceable data lost.

Link: http://news.bbc.co.uk/…
(via Slashdot)

Hacked Via Backup

Thursday, April 2nd, 2009

Computer SecurityYou’re a hacker who wants to break into a large web forum, steal their user data, and destroy their database. The site is using the latest software patches and has a large array of security features to prevent unauthorized intrusion. What do you do? Simple, hack into their off-site backup, which is not nearly as secure but still contains their database login credentials.

Link: http://ask.slashdot.org/…

The Sky is Falling! The Sky is Falling!

Sunday, March 29th, 2009

Computer SecurityWell-informed Chad’s News readers may have heard about the latest variant of the Conficker worm and the fact that it’s going to do something on April 1st. Simply put, the impact of this worm has been exaggerated. First, all that will happen is that the worm will change how it operates. Second, any effects will occur on systems that have already been infected. Keeping Windows updated and using current anti-virus software should be sufficient to keep yourself protected.

Link: http://www.networkworld.com/…
(via Slashdot)

Severe Firefox Exploit

Friday, March 27th, 2009

Firefox LogoThere’s a serious Firefox exploit that’s been published on the web. It relies on the user viewing a maliciously coded XML file. Mozilla is working on a patch, but until it’s ready, I recommend being careful about where and what you’re browsing.

Link: http://www.infoworld.com/…
(via Kim Komando)

Update: The fix is available now but won’t be pushed out via the update channel until next week.

Critical Adobe Reader Exploit

Tuesday, February 24th, 2009

Computer SecurityThere’s a new, critical flaw in the Adobe Reader software. Be careful about opening untrusted PDF files.

Link: http://www.infoworld.com/…
(via Kim Komando)

Update: The situation is getting even worse. On Windows systems it’s no longer necessary to even open the file.

Update #2: Adobe has released a fix.

More Password Insights

Sunday, February 22nd, 2009

Computer SecurityFrom the Neatorama article: “Analyst Robert Graham of Dark Reading, a website dealing with computer security issues, authored a fascinating report on the recent hacking of the popular website phpbb.com. The hacker published approximately 20,000 passwords from the site.” Many of the passwords were blatantly insecure, but who really cares if someone hacks your forum account? I have a standard, throw-away password for things like that. My online banking passwords, on the other hand, are much more complicated.

Link: http://www.darkreading.com/…
(via Neatorama)

Securely Wiping a Solid State Drive

Friday, February 13th, 2009

Hard DriveTurns out that wiping data from an SSD is much easier than from a traditional magnetic hard drive.

Link: http://www.computerworld.com/…
(via digg)

500 Worst Passwords

Tuesday, January 27th, 2009

Computer SecurityThe linked article has a list of the 500 most common passwords. If any of your passwords are on the list, it may be time for change. The site doesn’t explain how the list was compiled, but the original source is Perfect Passwords: Selection, Protection, Authentication by Mark Burnett and Dave Kleiman.

Link: http://www.whatsmypass.com/…
(via Consumerist)

Big Worm Attack

Friday, January 23rd, 2009

Computer SecurityApparently we are in the midst of a massive internet worm attack, the likes of which hasn’t been seen in years. Estimates of the number of compromised systems range from 6% to 30%. Let me clarify—that’s the percentage of all Windows computers in the world that have been taken over. The worm doesn’t destroy data on the target systems, it just turns them into ’bots for sending spam and creating DDOS attacks. Time to update those virus definitions and do a scan.

Link: http://www.computerworld.com/…
(via Kim Komando)

Lojack For the Laptop

Thursday, January 1st, 2009

Computer SecurityWhen your laptop is stolen, this new technology will lock the laptop, determine its location via built-in GPS, and send the location to a central server. Nice…

Link: http://www.marketwire.com/…
(via Engadget)