Happy Kernel Code Execution Via Internet Explorer

Posted: November 11th, 2009 | Author: | Filed under: IT Related | Tags: , , , , | No Comments »

Happy Kernel Code Execution Via Internet Explorer 😛

Read more:

Prevention/Solution..

Update ur Windows.. How? Errr… Here


Rest In Peace Str0ke (milw0rm)

Posted: November 4th, 2009 | Author: | Filed under: IT Related | Tags: , , | 10 Comments »

*********************UPDATED**************************
******************************************************
OMG!!!! I’ve just got Punk’d!!!
Str0ke is alive! http://twitter.com/str0ke/status/5422531377
Sorry Str0ke! Sorry everyone!
******************************************************

Many of us have wondered where str0ke has been and why milw0rm has not been updated in a good while. I recently was informed that str0ke has been hospitalized due to a strange condition with his heart, which he has had since he was a child.

Sadly….

I’ve just received information that str0ke @ milw0rm has passed away due to cardiac arrest early this morning at 9:23 AM. We @ blacksecurity are deeply saddened by the loss of a good hearted friend.

We wish nothing but blessing to his wife and 4 children.

RIP str0ke 1974-04-29 – 2009-11-03 09:23

:o(

Owh ya, Str0ke’s funeral is this Friday

[source: BlackSecurity]


Please Upgrade to Firefox 3.0.15 or 3.5.4

Posted: October 28th, 2009 | Author: | Filed under: IT Related | Tags: , , , , | No Comments »

Have you update your Firefox? Kindly tell me if you haven’t 😉

Naahh.. Just kidding.. Updates are available now.. Patch.. Patch.. and Patch.. Before its too late

Read more here:

[credit: IMG source]


Microsoft Announcing the Release of the Enhanced Mitigation Evaluation Toolkit (EMET)

Posted: October 28th, 2009 | Author: | Filed under: IT Related | Tags: , , , , , , , | No Comments »

Even as you read this, people around the world are hunting for vulnerabilities in software applications.  Odds are some of them will be successful.  Depending on their motives and what they find, your software and systems may be put at risk.  So how do you protect your software from unknown vulnerabilities that may or may not exist?  One option is to use security mitigations.

Microsoft offers a number of different mitigation technologies that are designed to make it more difficult for an attacker to exploit vulnerabilities in a given piece of software.  Take a look at Michael Howard’s article “Protecting Your Code with Visual C++ Defenses” (http://msdn.microsoft.com/en-us/magazine/cc337897.aspx) for a brief overview of some of these technologies.

Supported mitigations include:

  • SEHOP
  • Dynamic DEP
  • NULL page allocation
  • Heap spray allocation

[Read more: HERE]


Cyber Security is Evil! F-Secure is Evil!

Posted: October 27th, 2009 | Author: | Filed under: IT Related | Tags: , , , , , , | 2 Comments »

*still waiting for my advisory to be approved.. will post some links soon*

Hahaha.. Dont get me wrong.. I didn’t mean the companies are bad.. Its the rogue security software 😉

Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing

[source: wikipedia]

Lets see some screeny:


Yo! Cyber Security in da haus!


Google search lead to rogueware


Captain Obvious to the rescue! I’m in Linux and don’t have Windows installed 😉

Moral of the story:

  • do not simply trust free stuffs
  • keep your AV up to date
  • it is worth it to have antispyware installed (Malwarebyte’s Anti-Malware is not bad)
  • find anything suspicious? keep a copy of it.. share the sample with me 😛

*still waiting for my advisory to be approved.. will post some links soon*