|
Korean Job Discussion Forums "The Internet's Meeting Place for ESL/EFL Teachers from Around the World!"
|
View previous topic :: View next topic |
Author |
Message |
Bulsajo

Joined: 16 Jan 2003
|
Posted: Fri Jul 02, 2004 9:39 am Post subject: The Latest Security Alerts & Patches: Post Them Here |
|
|
Quote: |
Microsoft Statement Regarding Configuration Change to Windows in Response to Download.Ject Security Issue
Microsoft recommends that customers immediately install this configuration change to the Windows XP, Windows Server 2003 and Windows 2000 operating systems in order to improve system resiliency to protect against the Download.Ject attack.
REDMOND, Wash., July 2, 2004 (Updated 10:30 a.m. PDT) - On Thursday, June 24, 2004, Microsoft responded to reports that some customers running IIS 5.0 (Internet Information Services), a component of Windows 2000 Server, were being targeted by malicious code, known as "Download.Ject." Internet service providers and law enforcement, working together with Microsoft, identified the origination point of the attack -- a Web server located in Russia -- and shut it down on Thursday, June 24, 2004. (Additional information about Download.Ject is available at http://www.microsoft.com/security/incident/download_ject.mspx.)
The security of our customers�� computers and networks is a top priority for Microsoft, and we have been working around-the-clock to further address the criminal malware targeting Internet Explorer users. On Friday, July 2, 2004, Microsoft released a configuration change to the Windows XP, Windows Server 2003, and Windows 2000 operating systems that improves system resiliency to protect against the Download.Ject attack. We recommend that customers immediately install this configuration change through Windows Update (http://windowsupdate.microsoft.com).
In addition to this configuration change, which will protect customers against the immediate reported threats, Microsoft is working to provide a series of security updates to Internet Explorer in coming weeks that will provide additional protections for our customers.
Later this summer, Microsoft will release Windows XP Service Pack 2, which includes the most up-to-date network, Web browsing and e-mail features designed to help protect against malicious attacks and reduce unwanted content and downloads. A comprehensive update for all supported versions of Internet Explorer will be released once it has been thoroughly tested and found to be effective across a wide variety of supported versions and configurations of Internet Explorer.
Microsoft continues to recommend that all customers visit http://www.microsoft.com/protect to take the three key steps to protect their PCs. The three key steps are:
Use an Internet Firewall on all PCs and Laptops: An Internet firewall can help prevent outsiders from getting to your computer through the Internet. If you use Microsoft Windows�� XP, enable the built-in firewall.
Update Your Computer: Windows includes the automatic updates feature (Windows Update) which can automatically download the latest Microsoft security updates. Windows 98 SE and Windows ME can be updated from http://windowsupdate.microsoft.com.
Use Up-to-Date Antivirus Software: Installing, configuring and maintaining antivirus protection is absolutely essential.
We are continuing to work with law enforcement and industry partners to identify the individuals or entities responsible for Download.Ject Internet attack, and bring those responsible for this criminal act to justice. Customers who believe they may have been attacked should contact their local FBI or Secret Service office or post their complaint at http://www.ifccfbi.gov. Customers outside of the U.S. should contact their national law enforcement agency in their country. |
http://www.microsoft.com/presspass/press/2004/jul04/07-02configchange.asp |
|
Back to top |
|
 |
Bulsajo

Joined: 16 Jan 2003
|
Posted: Tue Jul 06, 2004 9:37 am Post subject: |
|
|
SECURITY ALERT:
Quote: |
Hackers grab bank details with fake ad
*****************************
PURPOSE
The purpose of this advisory is to bring attention to Hackers who have found a new method of stealing bank details from home computers.
ASSESSMENT
Img1big.gif is a file containing a Trojan named pwsteal.refest. It attempts to secretly install itself on the computer and steel confidential information.
A virus uncovered last week was hidden inside so-called "pop-up" advertisements that appeared on screen without warning, experts have warned. Clicking on the "close" button to get rid of the advert triggered the virus to attempt to secretly install itself on the computer. [ ] The bug was programmed to wait until the user began logging on to their internet bank account where it tried to steal personal details, such as passwords, before the information reached the bank. When Internet Explorer makes an HTTP POST request to one of these domains (for example, when the user submits a web form at a bank site), the Trojan also sends the information to a cgi script at www.refestltd.com.
The new Trojan was aimed at customers of nearly 50 banks around the world including:
• .anz.com
• .bendigobank.com.au
• .citibank.com
• .citibank.de
• .commbank.com.au
• .dab-bank.com
• .deutsche-bank.de
• .e-gold.com
• .hsbc.com.au
• .hsbc.com.hk
• .online-banking.standardchartered.com.hk
• .sparkasse-banking.de
• .stgeorge.com.au
• banking.lbbw.de
• banking.mashreqbank.com
• banknetpower.net
• barclays.co.uk
• cd.citibank.co.ae
• cibconline.cibc.com
• citibank.com.au
• dit-online.de
• easyweb.tdcanadatrust.com
• ebank.uae.hsbc.com
• ekocbank.kocbank.com.tr
• hercules.pamukbank.com.tr
• internetsube.akbank.com.tr
• lloydstsb.co.uk
• national.com.au
• nbd.ae
• online-banking.standardchartered.ae
• online.nbad.com
• pbg1.edc.citiaccess.com
• standardchartered.com
• suncorpmetway.com.au
• westpac.com.au
• www.alahlionline.com
• www.almubasher.com.sa
• www.arabi-online.com
• www.cbdonline.ae
• www.citibank.com.hk
• www.dahsing.com
• www.ebank.iba.com.hk
• www.privatebank.citibank.com.sg
• www.sabbnet.com
• www.samba.com
• www.scotiaonline.scotiabank.com
• www.unb.com
• www1.bmo.com
• www1.royalbank.com
SUGGESTED ACTION
PSEPC recommends that you ensure your anti-virus detection software definitions are current.
Additional information about this worm is available at the following links:
http://reg.smh.com.au/splash.do?site=SMH&server=http:%2f%2fwww.smh.com.au&retn=%2farticles%2f2004%2f07%2f05%2f1088879407085.html
http://securityresponse.symantec.com/avcenter/venc/data/pwsteal.refest.html |
|
|
Back to top |
|
 |
Bulsajo

Joined: 16 Jan 2003
|
Posted: Mon Jul 26, 2004 12:58 pm Post subject: |
|
|
MY DOOM resurfaces in a variant that attacks search engines.
Quote: |
Web Worm Spreads, Slowing Online Search Sites
Mon Jul 26, 2004 04:10 PM ET
By Daniel Sorid
SAN FRANCISCO (Reuters) - A fast-spreading computer worm that uses Web search sites to find victims made a broad assault on computers worldwide on Monday, causing problems for Google Inc. on the day it offered new details about its initial public offering, security experts said.
The spread of the worm, a variant of an Internet attack called MyDoom, was blamed for sporadic outages and slowdowns on Google -- the most popular search engine -- as well as the search sites of Yahoo and AltaVista.
The new MyDoom worm searches victims' computers as well as Internet search engines for e-mail addresses, and propagates itself by sending an infected file to the addresses it finds, security researchers said.
"Those search requests have been overloading the search engines," said Lloyd Taylor, vice president of technology for Keynote Systems Inc., which measures Web site performance.
The worm, Taylor said, was believed to be slowing performance on Google, AltaVista, a business of Overture Services Inc., and the Web site of Yahoo Inc. ... |
|
|
Back to top |
|
 |
Bulsajo

Joined: 16 Jan 2003
|
Posted: Thu Sep 16, 2004 6:07 am Post subject: |
|
|
RUNNING NETSCAPE, MOZILLA, OR FIREFOX? READ BELOW:
Date: 15 Sept 2004
*****************************
Multiple Vulnerabilities in Mozilla and Netscape
*****************************
PURPOSE
Multiple vulnerabilities have been discovered in Mozilla, Mozilla Firefox, Thunderbird and Netscape.These vulnerabilities can be exploited by malicious users to perform cross-site scripting attacks, access and modify vulnerable information, and compromise a user's system.
ASSESSMENT
These vulnerabilities reportedly affect versions prior to the following:
- Mozilla 1.7.3
- Firefox 1.0PR
- Thunderbird 0.8
The affected version of Netscape is Netscape 7.x
SUGGESTED ACTION
PSEPC recommends that security administrators test and apply the patches. The Mozilla Organization have released new versions of Firefox, Mozilla and Thunderbird which fix 10 vulnerabilities. Full details of known and fixed vulnerabilities in various Mozilla based software is available at:
http://www.mozilla.org/projects/security/known-vulnerabilities.html
At the time of this advisory, there is no known patch available for the Netscape vulnerabilities. For further information on the Netscape vulnerabilities, please visit the following link: http://secunia.com/advisories/12535 |
|
Back to top |
|
 |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|