Posts Tagged ‘internet security’

Ghost Rats And Zombies

Monday, March 30th, 2009

For quite some time, the Internet security community has been aware of computers being compromised and taken over as part of a “Zombie Army” or “Botnet”. (See the FTC’s article)

Now, a far reaching cyber espionage networks using Ghost RAT has been uncovered. A RAT is a Remote Access Trojan that takes over the host computer.

The GhostNet RAT uncovered by a team from the University Of Toronto found 1,295 infected computers in 103 countries. What makes these RATS all the more alarming is that it appears to be a well organized network attacking high level computers in government agencies, financial institutions and defense departments.

GhostNet was originally investigated because the Dalai Lama thought his computer might be infected.

The GhostNet RAT spreads itself through Microsoft Word documents or Adobe PDF files sent in email as attachments.

Tracking GhostNet: Investigating a Cyber Espionage Network

Security Update: White House’s Microsoft Outlook Email Outage

Wednesday, January 28th, 2009

by The Membrane Domain
Full Article

Headline: The President gets to keep his Blackberry, but the White House can’t keep their Microsoft server running for email.

Computer Internet Security Alerts

Monday, January 26th, 2009

Get the latest security updates.

* Apple QuickTime Updates for Multiple Vulnerabilities
Attackers may be able to exploit these vulnerabilities to execute arbitrary code or cause a denial of service.

*Microsoft Windows Does Not Disable AutoRun Properly
Microsoft Windows includes an AutoRun feature, which can automatically run code when removable devices are connected to the computer. AutoRun (and the closely related AutoPlay) can unexpectedly cause arbitrary code execution.

*Oracle Updates for Multiple Vulnerabilities
The impacts of these vulnerabilities include remote execution of arbitrary code, information disclosure, and denial of service.

*Microsoft Technical Cyber Security Alerts Multiple SMB Protocol Vulnerabilities
A remote, unauthenticated attacker could gain elevated privileges, execute arbitrary code, or cause a denial of service.