It’s that time of year when people dress up and kids over-indulge in candy. Yes, Halloween is upon us!
Speaking of which, are you still looking for that last-minute perfect costume? There are plenty of online shops where you can select an outfit that will scare your friends half to death.
To stay with our theme, today we are going to dissect a drive-by download that happened while browsing a Halloween online store.
This legitimate website suffered a malicious code injection, something very common if you are not running the latest version of your favorite CMS software or are using weak passwords.
Google’s Safe Browsing System determines php.net is malicious
Google’s Safe Browsing system deemed the official PHP website, PHP.net, malicious last week. Though, the initial reaction from PHP creator Rasmus Lerdorf was a false positive from Google; this was not the case.
This month marks the 10th Anniversary of National Cyber Security Awareness Month, or NCSAM, here in the United States and hopefully influences folks from all over the world to learn, prepare and take action to make our shared cyber world a safer one.
The theme is “Our Shared Responsibility” and I think that really hits the head on the nail when it comes to cyber security. Some people might think that using the Internet safely is purely for personal protection but it also protects potential victims that could only be attacked because of a single reckless user.
Security company VUPEN revealed a vulnerability in Java’s Preloader in early July that’s quite likely the same one being integrated into cyber criminals’ exploit kits.
According to VUPEN’s report, the vulnerability is “caused by a design error in the Java click-2-play security warning when the preloader is used, which can be exploited by remote attackers to load a malicious applet (e.g. taking advantage of a Java memory corruption vulnerability) without any user interaction.”
The flaw which affects Java version 7 update 21 and earlier bypasses the traditional security warning displayed before an applet is allowed to run:
Microsoft disclosed information on a new Internet Explorer zero-day vulnerability yesterday in a security advisory.
Dubbed CVE-2013-3893, the vulnerability exists in SetMouseCapture within mshtml.dll, part of Internet Explorer 6 through 11.
Fortunately, Microsoft released a “Fix it” workaround that will patch mshtml.dll and remove the vulnerability. Internet Explorer users should apply the Fix It immediately.