Spyware, Viruses, & Security forum

General discussion

NEWS - April 11, 2005

by roddy32 / April 11, 2005 1:22 AM PDT
Dozen new Mytob variants emerge over the weekend

Quoted from Harry Waldron's Security blog.
Monday, April 11, 2005

About one dozen new variants of Mytob emerged over the past weekend. This virus spreads by email and exploitation of unpatched Windows systems (MS03-026 and MS04-011). This family of viruses is apparently easy to clone and it may become the next Spybot or Agobot when it comes to active development of new variants.

more here
http://www.msmvps.com/harrywaldron/
Discussion is locked
You are posting a reply to: NEWS - April 11, 2005
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - April 11, 2005
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Convicted spammer gets nine-year sentence
by roddy32 / April 11, 2005 4:31 AM PDT
In reply to: NEWS - April 11, 2005

Published: April 11, 2005, 11:17 AM PDT
By Andy McCue
Special to CNET News.com

A convicted spammer has been sentenced to nine years in prison for sending more than 10 million junk e-mails a day.

Jeremy Jaynes, also known by his alias, "Gaven Stubberfield," is believed to have raked in between $500,000 and $750,000 a month through sales of products via spam. He was rated as the eighth most prolific spammer in the world by spam watchdog Spamhaus.

A circuit judge in Loudon County, Va., upheld the sentence recommended by the court when Jaynes was initially convicted last November under a recent Virginia antispam law, which limits the quantity of bulk e-mail that can be sent and prohibits the use of fake e-mail addresses.

Jaynes, a resident of North Carolina, fell foul of the law by routing the spam through servers located in Virginia, which disguised the origin of the e-mails. He was also found in possession of a stolen database of 84 million America Online e-mail addresses.

more here
http://news.com.com/Convicted+spammer+gets+nine-year+sentence/2100-1030_3-5662857.html?tag=html.alert

Collapse -
Site-blocking worm carries phishing risk
by roddy32 / April 11, 2005 5:13 AM PDT
In reply to: NEWS - April 11, 2005

Published: April 11, 2005, 11:55 AM PDT
By Munir Kotadia
Special to CNET News.com

updateA new variant of the Crowt worm could block infected browsers from accessing Web sites belonging to some antivirus sellers, Trend Micro has warned.

Crowt.D, first discovered on Wednesday, opens up the Google News site upon infection, then alters the computer's HOSTS file to add a list of Web site addresses, the antivirus company said in an advisory last week. When somebody clicks on one of those addresses, they are redirected to a local loopback address instead, a move that effectively blocks access to the sites in the list. The worm restricts access to antivirus vendor sites, including Trendmicro.com, Kapersky-labs.com, Sophos.com, Symantec.com and Us.mcafee.com.

more here
http://news.com.com/Site-blocking+worm+carries+phishing+risk/2100-7349_3-5662922.html?tag=html.alert

Collapse -
Study: People getting inured to the taste of spam
by roddy32 / April 11, 2005 6:25 AM PDT
In reply to: NEWS - April 11, 2005

Published: April 11, 2005, 12:50 PM PDT
By Jo Best
Special to CNET News.com

Fewer people find spam annoying or unpleasant as did a year ago, according to a study by the Pew Internet and American Life Project.

Currently, 67 percent of e-mail users say that spam negatively affects their online experience, compared with 77 percent a year ago.

People are also recovering their trust in e-mail, with 53 percent of users saying spam has sapped their confidence in e-mail, down from 62 percent a year ago.

The Pew Internet and American Life project has monitored e-mail users' attitudes towards spam during the last two years. Researchers with the project believe that negative reactions hit a peak about a year ago and will decline or level off over time.

more here
http://news.com.com/Study+People+getting+inured+to+the+taste+of+spam/2100-7348_3-5662996.html?tag=html.alert

Collapse -
Trend Micro bolsters anti-spyware lineup
by roddy32 / April 11, 2005 7:24 AM PDT
In reply to: NEWS - April 11, 2005

Published: April 11, 2005, 8:00 AM PDT
By Matt Hines
Staff Writer, CNET News.com

Network security specialist Trend Micro has revamped its anti-spyware lineup, launching on Monday a new version of its computer defense applications and a new package of tools to fight malicious software.

In coordination with the launch, Trend Micro released new research showing that spyware continues to plague corporate computer networks. Ninety-three percent of the 500 IT professionals who Trend Micro recently surveyed have experienced an increase in the volume of spyware found on their companies' networks during the past three months.

The survey, conducted for Trend Micro by TechRepublic, which is owned by News.com parent CNET Networks, also found that 87 percent of companies it queried believe that spyware will become an even bigger headache before it can be contained.

more here
http://news.com.com/Trend+Micro+bolsters+anti-spyware+lineup/2100-7355_3-5662504.html?tag=fd_nbs_ent&tag=nl.e433

Collapse -
New Series on Spyware Installation Methods
by Donna Buenaventura / April 11, 2005 7:33 AM PDT
In reply to: NEWS - April 11, 2005

"So-called "adware" companies say nonconsensual installations of their programs are just an "urban legend." (See section 7 of 180's claims in a recent interview.) But when I talk to users whose computers have become infected, I'm consistently told that they don't know how they got the unwanted programs, and they say they certainly didn't consent. How can we understand this divergence? How are users PCs receiving this unwanted software?

My new Spyware Installation Methods sets out a taxonomy of the ways unwanted programs sneak onto users' computers. Some installations rely on tricking users -- for example, showing confusing popups, or claiming or suggesting that an installation is required to view a web site. Others install unwanted software in bundles with programs users actually want -- sometimes telling users what they're getting in fine print midway through long licenses, but sometimes not even including these minimal disclosures. Finally, some spyware sneaks in through security hole exploits -- without any user consent at all, thanks to defects in users' web browsers or other software. (See the security hole video and write-up I posted last fall.)

There's lots to be done in documenting how unwanted software gets onto users' PCs. My Installation Methods page indexes my work to date, to the extent it's posted online. But I have much more documentation still to be posted -- for example, scores more videos showing security exploits. I'll be making additions in the coming months, as I find better ways to present this work clearly and efficiently, and as I find clients or other revenue sources to help support this work. (I'm still looking! Send suggestions.)

Today I'm also starting what I intend to be a series of weekly updates to my site -- tentatively entitled "misleading installation of the week."...

by Benjamin Edelman - http://www.benedelman.org/news/041105-1.html

Collapse -
Rootkit Web sites fall to DDoS attack
by Donna Buenaventura / April 11, 2005 8:06 AM PDT
In reply to: NEWS - April 11, 2005

Two prominent Web sites that specialize in remote access software known as "rootkits" have been taken offline by a large distributed denial-of-service attack. The take-down was allegedly ordered by a shadowy group of hackers and rootkit authors who took offense to criticisms of their software posted on the sites.

Rootkit.com, an established Web site run by security expert Greg Hoglund, has been offline for almost a week. Two other sites, operated by a prominent rootkit author known as "Holy Father" have also been taken down in the attacks, which are believed to be the work of a group of Bulgarian and Turkish hackers known as the SIS-Team, according to Hoglund, the CEO of HBGary, an information technology software and services company.

http://www.nwfusion.com/news/2005/0411rootkwebs.html

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?