A clever SMS is doing the rounds, and is seen to be the first instance of a keylogger being spammed through a cellphone. The cellphone users receive a text message enticing them to type the link into their phone browser. If they do this, a keylogger Trojan is installed and the rest is history.
On to Kukudro - a Trojan which accounts for 35% of all malware reported to Sophos. This horse has been spammed out in large quantities and uses subject lines such as including "Worth to see", "Prices", and "Hello".
The mail comes attached with an infected Word document displaying information about Apple, Sony and HP laptops, which can lead to a hacker gaining access if opened.
Laid off
California-based Symantec is retrenching 80 of its employees for strategic purposes. The company will stop making hardware for Symantec Gateway Security (SGS), Symantec Network Security (SNS) 7100, and the SGS Advanced Manager 3.0 products.
Applications currently in the market, however, will continue to be sold and supported.
MS flaws
A clever SMS is doing the rounds, and is seen to be the first instance of a keylogger being spammed through a cellphone.
Ilva Pieterse, ITWeb contributor
A report notes that two new IE flaws have surfaced allowing attackers to bypass security restrictions and launch malicious commands.
The one flaw has to do with an origin validation error when handling the "object.documentElement.outerHTML" property, which could be exploited by remote attackers to read content and data served from another domain in the context of a malicious Web page.
The other flaw creates an error when browsing file shares, which attackers could exploit to trick a user into executing a malicious .hta file via a specially crafted Web page.
Apple fix
Apple has just released Mac OS X version 10.4.7 to address multiple security holes in the operating system.
The flaws included:
* An information disclosure vulnerability affecting the AFP server component.
* A stack-based buffer overflow vulnerability affecting ImageIO when viewing malformed .tiff images.
* A local format-string vulnerability, which affects the operating system`s logging facility and may be exploited by attackers to execute arbitrary code with elevated privileges.
* A denial-of-service vulnerability, which affects OpenLDAP.
Sources used: SearchSecurity, The Register, CA
Share