From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

From Security Standpoint, You May Want To Forget a Windows 10 Upgrade

Hello all, Blogmaster here – who also has run a Community Free help site for malware removal and information etc since around 2005. Here and there, more and more seeing many writings about the new Windows 10 from a security standpoint – well for me it is forget it. I will probably never buy one and certainly will not upgrade. I would rather switch to Linux forever than go through what they have going on now.

There is a circumvention of security with a more or less full blown allowance to third party ad network type activities. A lot like downloading software with adware and spyware bundled secretly inside and installs. It is a thumbing of the nose at the public for dollar$ gained through this type of harvesting. When this began around 2001-2002 and 2003, all laws and softwares were created to make it illegal as well as block and detect and remove it from any PC. This is when and where adware and spyware were discovered.

One hand washes or shakes the other on the internet as far as trying to get money to pay bills through ads etc. Most of the innocent are actually welcomed across the board – an ad here there – but sometimes irritating. Depends if you are surfing or studying. The infection by adware creates the continual intermittent pop up annoying ads and can as well be leaking personal information to third parties. This is how legally antispyware companies were legally allowed to create antispyware and as well, publicly declare these as adware infections without libel suit.

So the whole point here is basically that with Windows 10 – the world wide web is returning to those days of allowance and naivete to those days immediately preceding the spyware category of threats being discovered. (I have noticed some security products do not block browser leaks as much as you would think.) They’re sticking it to the newbies again, in a reverse manner of trying to help with UAC being released in Vista forward and much else to make security as automatic as possible for novices (newbies). If you were around for those “XP Years” when this was the day, you’ll see and get this feel all over again in reading this great blogpost below describing security and Windows 10. (Emsisoft Antimalware is all I have recommended as top product for several years now – which indeed blocks any attempt of a browser leak with user choices as you can plainly see in a free trial).

Of course for veteran users who tweak security settings across the board in Windows – there is going to be a lot to turn off and block anywhere possible which may be the cure. Some services will obviously be forget it -don’t use it, just use Windows as it was still 7 or 8. But read this blog for sure, if new or experienced user, and get a good eye full of what Windows 10 is doing to computing security. I won’t doubt there may even be lawsuits for data breach causing ID Theft long the near future.

The truth about Windows 10 spying on almost everything you do
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
In Security Knowledge
by Carla September 2, 2015 |

You have probably heard the news by now: Microsoft has updated a controversial service agreement that lays out in scary detail how your personal data is being used and abused – at least, that’s what the major tech blogs are saying. But the reality is, even if you read the 12,000 word service agreement, it’s still confusing and vague at best. ….

…..”Cortana is your voice-activated personal assistant, much like Siri and Google Now. But in order for her to operate, Windows 10 collects your personal information to better serve you. This includes calendar events, contact information, alarm settings, what you view and purchase, your browsing history, emails and text messages… “and more”.” …..

….. “OneDrive is Microsoft’s cloud storage system, and it comes with the Windows 10 territory. You might think it’s great because there is no additional sign up or installment required and you can access it from any of your Microsoft devices. But this new convenience comes with a price.
Every time you are signed into your machine with your Microsoft account, your operating system immediately syncs your settings and other data to company’s servers. This includes browser behavior and history, as well as mobile hotspot and Wi-Fi network passwords.” …..

READ IN FULL:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/

REMEDY / FIX …..

O&O ShutUp10
Free antispy tool for Windows 10
O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far.
Using a very simple interface, you decide how Windows 10 should respect your privacy by deciding which unwanted functions should be deactivated.
O&O ShutUp10 is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days!

IN FULL AND DOWNLOAD LINK…..
HAS BEEN RECOMMENDED HERE:
http://blog.emsisoft.com/2015/09/02/the-truth-about-windows-10-spying-on-almost-everything-you-do/
https://bluecollarpcwebs.wordpress.com/2015/09/09/from-security-standpoint-you-may-want-to-forget-a-windows-10-upgrade/

O&O ShutUp10
The telemetry components of Windows 10 and the way they affect the user’s privacy is a controversial topic ever since the release of the most recent iteration of Microsoft’s operating system. While many options can be tampered with during setup, there are applications out there specifically tailored to allow the manual tweaking of Windows 10’s security settings. One of them is O&O ShutUp10.
Various range of tweaks for Windows 10
Requiring no installation, O&O ShutUp10 provides users with a simple means of customizing the privacy options in Windows 10 and thus decide which data collection options will stay enabled and which should be blocked.
http://www.softpedia.com/get/Tweak/System-Tweak/O-O-ShutUp10.shtml


SENDER: gerald309 —
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/
Alternate https://sites.google.com/site/pcsecurityhelper/
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com
Free Malware Removal Help / A Community Website Since 2005
MOBILES: http://pdamobilecafe.wordpress.com/
Alerts: pdamobilecafemobilealertlist-subscribe@yahoogroups.com
RSS: https://groups.google.com/forum/feed/pdamobilecafe-mobilealerts/msgs/rss.xml?num=15

Review: Comodo Internet Security 7 (Best Free with Real Time Protection)

Review: Comodo Internet Security 7 (Best Free with Real Time Protection)

Comodo Internet Security 7.0.313494.4115
Razvan Mihai Asmanow Serea
http://www.neowin.net/news/comodo-internet-security-703134944115

16 hours ago 0 Comments submit to reddit
Tweet
QUOTED:

Comodo Internet Security is the free, multi-layered security application that keeps hackers out and personal information in.Built from the ground upwards with your security in mind, Internet Security offers 360° protection by combining powerful Antivirus protection, an enterprise class packet filtering firewall, advanced host intrusion prevention and automatic sandboxing of unknown files.Unlike the stripped down versions of commercial software that other software vendors offer for free, this is the full, completely functional version of the product.

Main features of Comodo Internet Security:
•Antivirus: Tracks down and destroy any existing malware hiding in a PC.
•Anti-Spyware: Detects spyware threats and destroys each infection.
•Anti-Rootkit: Scans, detects & removes rootkits on your computer.
•Bot Protection: Prevents malicious software turning your PC into a zombie.
•Defense+: Protects critical system files and blocks malware before it installs.
•Auto Sandbox Technology™: Runs unknown files in an isolated environment where they can cause no damage.
•Memory Firewall: Cutting-edge protection against sophisticated buffer overflow attacks.
•Anti-Malware Kills malicious processes before they can do harm.

What’s new in this version:

Viruscope
•Viruscope monitors the activities of processes running on your computer and alerts you if they attempt to take suspicious actions. Apart from forming yet another layer of malware detection and prevention, the
……..
IN FULL:
http://www.neowin.net/news/comodo-internet-security-703134944115

GET COMODO HERE…. http://www.comodo.com/home/internet-security/antivirus.php

Report: Softwares responsible for 76% of vulnerabilities – install Secunia PSI

Report: Softwares responsible for 76% of vulnerabilities – install Secunia PSI

Third-party programs responsible for 76% of vulnerabilities in popular software Posted on Feb 27, 2014 11:28 am Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia’s Vulnerability Review 2014, which is based on a samp… Read in browser » http://www.net-security.org/secworld.php?id=16448  

NOTE this was the great efforts and design and reasons for Microsoft creating Windows Vista, as it was shown and proven that Windows was NOT the reason for so much malware as an inadequately safe operating system. It was the third party – or simply all other softwares users installed on their computers that were the causes of malware infections via poor inadequate security coding and mainly always using Administrator Privileges were it was not necessary which gave malware administrator rights to run on the system. UAC – User Account Control was born in Vista which mitigated this. Bill Gates and Microsoft addressed ALL software creators worldwide to design safer hard coded softwares security-wise and not using administrator rights continually where not appropriate or necessary to run.

The security re-designed Windows Vista was on the heels of the Windows XP launch and years – where much of today’s malware was created and invented such as spyware itself, which did not exist before Windows XP. Here we are again with this reliable, credible, and well respected Secunia report. Malware is infecting systems thru weak softwares and NOT because of the Windows Operating System design. 

It is more than highly recommended for all users to install this free software for Home Users from Secunia (which I use too) which is a reliable durable software program that will scan the web for software updates that get issued for all softwares you may have installed. It can be set to automatically update them or manually. It can set to run with each computer start up in the background or to manually start and run a scan periodically as once a week or twice monthly. Now to do this manually can take hours and hours going to the software home website to check if updates are available, which many times are too hard to find at the site or not even posted there. Many softwares today finally added a Check For Updates button, which again can take all the time to continually open and close each software to check for Updates. The Secunia PSI automates these tasks ! HIGHLY RECOMMENDED AND IS FREE TO HOME USERS !

INSTALL THIS TO KEEP ALL YOUR INSTALLED SOFTWARES UP TO DATE !
(NOTE this will not install software Upgrades to next versions like on paid-for softwares were it will cost more for an upgrade. It scans for updates to your existing version.)

Secunia Personal Software Inspector (PSI)
(Download at website)
http://secunia.com/vulnerability_scanning/personal/  
The Secunia PSI explained
The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks. Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to maintain a secure PC. Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.  

YOUTUBEs:
(From Secunia) :

PSI 3.0 Walkthrough
http://www.youtube.com/watch?v=iUmaLmO0gx0&feature=youtu.be  

Tim and Dave
Short animated story about security and why Tim is happier than Dave. http://www.youtube.com/watch?v=h5rZkCnKMCM&feature=youtu.be  

WHO IS SECUNIA?
Secunia
http://en.wikipedia.org/wiki/Secunia  
From Wikipedia, the free encyclopedia

-- 

SENDER: gerald309 -- 
Have A Safe Computing Day!
Webmaster: Malware Removal/Amateur Forensics
HOME http://bluecollarpc.us/ 
Alternate https://sites.google.com/site/pcsecurityhelper/ 
HELP http://tech.groups.yahoo.com/group/BlueCollarPCSecurity/ 
Membership/Join List:
Subscribe: BlueCollarPCSecurity-subscribe@yahoogroups.com 
Free Malware Removal Help / A Community Website Since 2005

 

How And Where To Report Cyber Crime

How And Where To Report Cyber Crime

REPORT CYBER CRIME

Internet Crime Complaint Center (IC3)
http://ic3.gov/
The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3’s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes. read more >> http://ic3.gov/

Federal Trade Commission (USA) Complaint Input Form
https://rn.ftc.gov/pls/dod/widtpubl$.startup?Z_ORG_CODE=PU03
If you believe you have been the victim of identity theft, you may use the form below to send a complaint to the Federal Trade Commission (FTC). The information you provide is up to you. However, if you don’t provide your name or other information, it may be impossible for us to refer, respond to, or investigate your complaint or request. To learn how we use the information you provide, please read our Privacy Policy.

Federal Bureau of Investigation – Cyber Investigations – Cybercrime
http://www.fbi.gov/cyberinvest/cyberhome.htm

Computer Crime & Intellectual Property Section
http://www.cybercrime.gov/

WiredSafety.Org
http://www.wiredsafety.org/911/
Our Cyber911 Help tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement…

ReportCybercrime.Com (Private)
http://www.reportcybercrime.com/
Also, through our interactive forum you can get opinion of specialist attorneys and lawyers. Each lawyer in practice will give his opinion on matters, which are raised in the forum. You Can post queries view answers from experts and improve upon your knowledge base…

How to Report Cybercrime
http://www.katiesplace.org/report_cybercrime.html
WiredSafety’s Cyber911 Emergency tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement.

Take a Bite Out of Cyber Crime
ByteCrime.Org
http://www.bytecrime.org/

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , , . Comments Off on How And Where To Report Cyber Crime

Forensics: “Unknown Flash Movie Virus”

(((FORENSICS~BUILD)))

Forensics: “Unknown Flash Movie Virus”

For a friend….

ESTIMATE: Embedded Flash Movie Malware Payload
NOTE: Possible Network Attack Associated – Botnet/Botmaster
SEE: Common Types of Network Attacks – TechNet – Microsoft
http://technet.microsoft.com/en-us/library/cc959354.aspx
(According to payload that executed, spoofed PC Identity apparent, unsuccessful)

DEVICE: Windows Vista HP (Home Premium) SP2 (Service Pack 2, Fully Patched) / IE9 (Internet Explorer Version 9) – on Home Network / Microsoft Security Essentials installed/running.

SYMPTOMOLOGY:
Viewing Flash Movie in embedded webpage player. Best description from user was sudden turbulence of browser and disconnection and system crashings and then the WGA (Windows Genuine Advantage) panel pop up on restart identifying PC as an illegitimate copy of Windows was running. Connectivity was not further possible.

SUSPENDED FORENSICS:
A full payload forensics was suspended citing any in-the-wild attack or proof-of-concept – and is not being posted publicly. Operating System was reinstalled to Factory Fresh – wiping the disk – now fully patched to current operation.
HISTORY: New virus first to infect Macromedia Flash (January 8, 2002)
http://news.cnet.com/New-virus-first-to-infect-Macromedia-Flash/2100-1023_3-803829.html

SYNOPSIS:
Apparently malware payload (not just a virus) executed on Windows Vista HP SP2 / IE9 while viewing flash movie in an embedded player at website. This was the only affected computer on a Home Network with other computers unaffected. Other peripherals and router were not affected. This may constitute as specific targeting of the IP via Network Attack. It seems possible a botnet infection was unsuccessful as connectivity was destroyed, yet the operating system was spoofed and identified as now a pirated copy of Windows via WGA technologies apparently. There were no ransomware activities observed http://en.wikipedia.org/wiki/Ransomware_(malware) …thus the spoofing of the Windows OS (operating system) itself as now a pirate copy indicates the WGA notification window/panel was valid and not a fake shell as some ransomware scam. Note it is possible it was simply a targeted payload to simply destroy the system from further use as the intended malware malicious intent.

DIAGNOSIS:
Apparent multi-malware payload executed through infected flash movie possibly originating from Apple/Mac computer as possibly an iFrame Movie.

iFrame (video format)
http://en.wikipedia.org/wiki/IFrame_(video_format)

Universally and historically Apple/Mac users are in ‘caveman’ days as not using antimalware. Recently things have changed, as infections have increased dramatically in infancy for this operating system. Linux even more so, their users are now told it is “polite” to use antivirus to protect uploading or exchanging any Windows infecting files from a Linux computer that do not affect Linux – but will infect Windows PCs. Newer Community guidelines. Years ago…..

Microsoft JPEG Vulnerability and the Six New Content Security Requirements
http://whitepapers.silicon.com/0,39024759,60129423p-39000575q,00.htm
In November 2004, a critical Microsoft security vulnerability (MS04-028) was discovered which could allow attackers to embed malicious code inside JPEG image files. Until that time, JPEG image files were considered immune to attack. To effectively deal with this vulnerability, security and IT professionals need to incorporate six new and critical content security requirements into their networks.

…..so that this is the idea with an infected flash movie. Simply visiting a website with the infected picture (JPEG) would infect the unprotected PC. Same with infected flash files is apparent here as source of infection.

NOTE…. Was a novice user and is believed there were possible additional clicks not mentioned possible that caused the malware payload execution.

REMEDY:
With a multi-malware payload as opposed to just a virus, the operating system was reinstalled / restored to Factory Fresh condition – wiping the disk first of all data. A much higher quality paid subscription antimalware product was installed and absolutely recommended! Note that Microsoft Security Essentials was the installed and active protection on the PC…. HOWEVER:

Is Microsoft Security Essentials adequate protection?
http://bluecollarpc.us/2013/04/21/is-microsoft-security-essentials-adequate-protection/
Review: Microsoft Security Essentials
http://www.expertreviews.co.uk/software/1295698/microsoft-security-essentials
Microsoft Security Essentials bombs AV-TEST, loses certification
http://www.geek.com/articles/geek-pick/microsoft-security-essentials-bombs-av-test-loses-certification-20121129/
Microsoft Security Essentials Fails Tests, Loses Antivirus Certificate
http://www.bit-tech.net/news/bits/2013/01/17/ms-security-av-test/1
Microsoft Security Essentials fails AV-TEST again
http://www.bit-tech.net/news/bits/2013/01/17/ms-security-av-test/1
Microsoft fights back on antivirus certification fail, claims malware tests …
http://www.zdnet.com/microsoft-fights-back-on-antivirus-certification-fail-claims-malware-tests-arent-realistic-7000009998/

PLEASE REVIEW THE FOLLOWING INFORMATION AND RECOMMENDATIONS….

How to Fix a Flash Virus | eHow.com
http://www.ehow.com/how_5998536_fix-flash-virus.html

Adobe Flash
http://en.wikipedia.org/wiki/Adobe_Flash

SWF (ShockWave Flash)
http://en.wikipedia.org/wiki/SWF

What Is a Flash Cookie?
http://www.ehow.com/info_10020896_flash-cookie.html

Can Flash Extensions Be Harmful?
http://www.ehow.com/info_12229878_can-flash-extensions-harmful.html

How to Check & Uninstall Flash Cookies
http://www.ehow.com/how_5943906_check-uninstall-flash-cookies.html

How to Clear Macromedia Flash Shared Objects
http://www.ehow.com/how_6182429_clear-macromedia-flash-shared-objects.html

Website Storage Settings panel
http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager07.html

Visit the Adobe Flash Player Settings Manager http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html

It is recommended to be aggressive here and deny all actually, especially noting that nefarious hackers break into microphones and webcams to spy. If having trouble after choosing to block all from being stored on computer go back and make adjustments. Any ‘faster’ use of allowing storage is antiquated and ancient as pertaining to 56K Dial Up years and years ago – as the vast majority have switched to broadband/dsl where available – not quite everywhere though (rural etc).

WEBMASTER BLUECOLLARPC.US
http://bluecollarpc.us/

The BlueCollarPC.US (and former domain extensions) has always been a free Community Help Site and here is a mock severe billing if able to work from an official PC Repair Shop…… LOL

————

JOB BILL / TICKET #001

# Bench Charge………………….$75.00

# Forensics Basic / Suspended…….$25.00
(Normally $150.00 with full reporting)
Discounted!

# Reinstall Factory Fresh Windows…$50.00
…Discounted !

# Fully Patched and Reinstalled
softwares, 18 hours (Vista SP2)….$100.00

TOTAL ……..$250.00

Catch Up With Java Malware Information

Catch Up With Java Malware Information….. Day after day seemingly, week after week, for about 100 days or more it seems cyber crime has declared war on Java a handful of ‘zero days’ as well have been suffered. For security reasons it has been actually advised to disable Java in ALL browsers and even uninstall Java from the computer. This has been no joke if you have not been keeping up with all the security warnings and actual INFECTIONS occurring via exploiting Java ! READ ON TO CATCH UP IF YOU MUST ! ! ! FOLLOW THE TIMELINE TO DATE….

CLICK THE MESSAGE LINKS TO GO TO THE WEBSITE AND FULL STORY DETAILS….

 Aug 29, 2012

US-CERT Alert – Oracle Java 7 Security Manager Bypass Vulnerability
Fw: US-CERT Alert TA12-240A – Oracle Java 7 Security Manager Bypass Vulnerability…System US-CERT Alert TA12-240A Oracle Java 7 Security Manager Bypass Vulnerability…Yet * Let’s start the week with a new Java 0-day in Meta…..

Critical Java 0-day flaw exploited in the wild
Critical Java 0-day flaw exploited in the wild Posted on Aug 27, 2012 06:11 pm Researchers…security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims…

Aug 30, 2012

Unpatched Java exploit spreads like wildfire
Unpatched Java exploit spreads like wildfire Naked Security Sophos customers are proactively protected against the malware payload as Troj/Agent-XNE and the malicious Java applet as Mal/JavaKnE-H. Sophos endpoint customers using our web protection…

Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim
Java 7 Under Attack: Researchers Advise It Be Disabled During The Interim CRN…thereof. “IT administrators’ only defense at the moment is to limit the use to Java,” wrote Wolfgang …

Disable Java NOW, users told, as 0-day exploit hits
web

Disable Java NOW, users told, as 0-day
exploit hits web Register The vulnerability allows…keylogger or some other
type of malware . The payload does not need to be a Java app itself. In
the form in which it …

Java 0-day exploit added to Blackhole kit, still no news
about patch

Java 0-day exploit added to Blackhole kit,
still no news about patch Posted on Aug 29, 2012 12:20 pm The recently
discovered Java zero-day flaw that has been spotted being used in limited
targeted attacks in…

Aug 31, 2012

Zero-day Java flaw exploited in targeted tax email malware attack
Zero-day Java flaw exploited in targeted tax email malware attack by Paul Baccas on August…cybercriminals have taken advantage of the critical zero-day flaw vulnerability in Java, sending out malicious emails which pretend to come from an accountancy firm…

Java Zero-Day Malware Attack: 6
Facts

Java Zero-Day Malware Attack: 6 Facts
InformationWeek Businesses are growing worried about drive-by infections by
malware that exploits two zero-day Java vulnerabilities. Attackers,
apparently operating from China, chained the two…

Java is Insecure and Awful, It’s Time to Disable It, and
Here’s How

Java is Insecure and Awful, It’s Time to
Disable It, and Here’s How As usual, there’s yet another security hole in the
Java Runtime Environment, and if you don’t disable your Java
plugin, you’re at risk for being infected with malware. Here…

Sep 1, 2012

Java 0-day exploit served from over 100 sites
Java 0-day exploit served from over 100 sites Posted on Aug 30, 2012 03:23 pm The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers…

US-CERT Releases Oracle Java JRE 1.7 Security Advisory
Fw: US-CERT Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory —–Original Message—– From…Awareness System US-CERT Current Activity US-CERT Releases Oracle Java JRE 1.7 Security Advisory Original release date: Tuesday…

Oracle releases patches for Java vulnerability CVE-2012-4681
http://thehackernews.com/2012/09/oracle-releases-patches-for-java.html
21
hours ago – Oracle has released a new patch which kills off a
vulnerability
in Java 7 that was being exploited by malware developers. “Due
to the high
severity of these …

Encyclopedia entry:
Exploit:Java/CVE-2012-4681.DM – Learn more
http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Exploit%3AJava%2FCVE-2012-4681.DM
12
hours ago – Summary. This threat is detected by the Microsoft
antivirus
engine. Technical details are not currently available for this
threat. Top

Unpatched Java Vulnerability Exploited in Targeted
Attacks, Researchers Say

Unpatched Java Vulnerability Exploited in
Targeted Attacks, Researchers Say PCWorld (blog…has been … 

Oracle fixes Java 7 web browser flaw
Oracle fixes Java 7 web browser flaw IT PRO Software giant Oracle has finally released a patch…malware . The US government warned end users to be on their guard against Java 7 zero-day vulnerabilities … 

Oracle provides early patch for
Java

Oracle provides early patch for Java iTWire
The next Java update was scheduled for October 16…also includes fixes
for two other vulnerabilities affecting Java running …

Update Java in Control Panel ! Oracle releases security
patch for Java vulnerability

Oracle releases security patch for
Java vulnerability Siliconrepublic.com Before now, the only way to
protect computers from potential malware attacks exploiting this…

Sep 3, 2012

Oracle patches Java 0-day, researchers say there is
another one

Oracle patches Java 0-day, researchers say
there is another one Posted on Aug 31, 2012 02:09 pm Oracle has finally issued
an update for Java 7 (v 1.7.0_07) which solves the problem of the
CVE-2012-4681 vulnerability…

After patch, researchers find another Java vulnerability
After patch, researchers find another Java vulnerability SC Magazine Australia Hours after the company that maintains…

Oh No Not Again! New Java Vulnerability Uncovered In
Latest Java Update

Oh No Not Again! New Vulnerability Uncovered In
Latest Java Update Forbes Adam Gowdiak, CEO and founder of Security
Explorations, has…

Sep 5, 2012

Fake Amazon emails open the way for
malware

Fake Amazon emails open the way for malware Posted
on Sep 04, 2012 01:15 pm The CVE-2012-4681 Java zero-day vulnerability
might have been patched, but because it was added to the popular Blackhole
exploit kit and because most…

Fw: Another Java Security Flaw Appears After Oracle Patch
Another Java Security Flaw Appears After Oracle Patch TechWeekEurope…Researchers have uncovered another potentially Java security flaw, which could be used by hackers…Current Activity – US-CERT Releases Oracle Java JRE 1.7 Security Advisory ….

Rogue Microsoft Services Agreement emails lead to latest Java exploit
Rogue Microsoft Services Agreement emails lead to latest Java exploit Computerworld IDG News Service – Hackers are distributing…

Article: Thanks ever so much Java, for that biz-wide
rootkit infection

Thanks ever so much Java, for that biz-wide
rootkit infection Register Shortly after I awoke to…client called to inform me
his computer had contracted some malware . Java has, if you’ll forgive
the anthropomorphization of a bytecode virtualization…

Sep 14, 2012

Oracle confirms existence of another critical Java
flaw

Oracle confirms existence of another critical
Java flaw Posted on Sep 11, 2012 03:45 pm When Oracle finally patched the
CVE-2012-4681 Java 0-day that was being actively exploited…

Nov 2, 2012

Jacksbot Java malware can take control of Windows, Mac,
and Linux systems

Jacksbot Java malware can take control of
Windows, Mac, and Linux systems The Next Web…software company Intego
discovered malware which it classified as “a new Java backdoor trojan
called Java/Jacksbot.A.” New threats are discovered all…

Nov 24, 2012

Warning out vs new cross-platform
malware

…vendors warned computer users over the weekend
against a new malware that can potentially affect various platforms that support
Java. In a blog post, Trend Micro pointed out …

Jan 3, 2013

Java server malware targets Windows systems
Java server malware targets Windows systems SC Magazine Researchers have discovered a backdoor delivered by a malicious JavaServer Page (JSP), which targets vulnerable Java-based HTTP servers and allows an attacker to hijack infected systems. The malware…

Jan 12, 2013

New malware exploiting Java 7 in Windows and Unix systems
New malware exploiting Java 7 in Windows and Unix systems CNET The malware has currently been seen…OS X, may be able to do so given OS X is largely similar to Unix and Java is cross-platform. Additionally, the exploit is currently being …

Java flaw poses malware threat to PC users
Java flaw poses malware threat to PC users Financial Times A serious flaw in the Java software found on most personal computers could expose the machines to being…

New Java 0-day exploited in the wild
New Java 0-day exploited in the wild Posted on Jan 10, 2013 04:45 pm A new Java zero-day being exploited in the wild has been found. With the files we were…

Disable Java! Recent 0-day exploit is included in exploit kits
Disable Java! Recent 0-day exploit is included in exploit kits Posted on Jan 11, 2013 06:00 pm The Java zero-day that has recently been spotted being exploited in the wild has turned…

Jan 13, 2013

US-CERT Releases Oracle Java 7 Security
Advisory

Fw: US-CERT Current Activity – CERT Releases Oracle
Java 7 Security Advisory…Vulnerability Note VU#625617 to address a
vulnerability in Oracle Java Runtime Environment (JRE) 7 and earlier that
is currently…

Jan 15, 2013

Week in review: Java 0-day wreaking havoc, hiding
messages in Skype silences, Apple prevents popular app scam
tactic

Week in review: Java 0-day wreaking havoc,
hiding messages in Skype silences, Apple prevents popular app scam tactic Posted
on Jan 14, 2013 06:00 am…

US-CERT – Out-of-Band Patch to Address Java 7
Vulnerability Released

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerability…band patch to address the
recently announced vulnerability in Java Runtime Environment (JRE) 7.
US-CERT encourages users and…

Security: Homeland Security Warns About Java
Malware

Homeland Security Warns About Java Malware
DrJays.com Live A newly-discovered vulnerability
in…

How To disable Java in my web
browser

How do I disable Java in my web browser?
http://www.java.com/en/download/help/disable_browser…Macintosh OS X
•Browser(s): Internet Explorer, Firefox, Chrome, Safari •Java version(s):
7.0, 7u10+ FULL INSTRUCTIONS (easy) …..

Jan 16, 2013

Oracle patches critical 0-day with new Java
update

Oracle patches critical 0-day with new Java
update Posted on Jan 14, 2013 01:05 pm Oracle has released Java 7 Update
11, the computing platform’s newest version that patches…

Oracle delivers 86 security
fixes

…fixes Posted on Jan 16, 2013 10:06 am Oracle has
had two major updates in the last 2 days. On Sunday, Jan. 13 a new version of
Java 7 was released that addresses the 0-day vulnerability that has been
exploited in the wild. The Oracle C…

Surprised? Old Java exploit helped spread Red October
spyware

Surprised? Old Java exploit helped spread Red October spyware Register Unpatched Java installations…October on
Monday, …

Malware masquerades as patch for
Java

Malware masquerades as patch for Java
ITworld.com Hackers often disguise their malware as a legitimate…

Jan 21, 2013

Java Security ‘Fix’ Is Disguised Malware
Attack

Java Security ‘Fix’ Is Disguised Malware
Attack InformationWeek The malware may be…against browsers. The attack begins
with a Web page warning that a newer version of Java is required to …

Newest Java update doesn’t fix fresh critical
vulnerabilities

Newest Java update doesn’t fix fresh
critical vulnerabilities Posted on Jan 21, 2013 03:26 pm Another week, another
zero-day threatening millions of Java users. As you might remember, last
week Oracle released Java 7 Update 11, which…

Jan 28, 2013

Beware of fake Java
updates

Beware of fake Java updates CNET January 22,
2013 9:30 AM PST. Following recent security vulnerabili…vulnerabilities in
Java, malware developers are taking a new approach to exploit the
Java platform by issuing false updates that pose as legitimate updates
for the…

Java’s new “very high” security mode can’t protect you
from malware

Java‘s new “very high” security mode can’t
protect you from malware Ars Technica Security researchers have uncovered a
newly discovered bug in Oracle’s Java framework that allows attackers to
bypass important security protections designed…

Feb 2, 2013

US-CERT- Oracle Releases Out-of-Band Patch to Address
Java 7 Vulnerabilities

…Current Activity – Oracle Releases Out-of-Band
Patch to Address Java 7 Vulnerabilities —–Original Message—– From:
Current…out-of-band patch to address multiple vulnerabilities in the
Java Runtime Environment (JRE) 7 Update 11 and earlier. These
vulnerabilities…

Security: Firefox will block by default nearly all
plugins

Firefox will block by default nearly all plugins
Posted on Jan 30, 2013 08:08 pm Following the recent debacle of the critical
Java 0-day that was being actively exploited in the wild, in an attempt
to minimize its users’ attack surface Mozilla has enabled “Click…

Feb 6, 2013

Oracle rushes out emergency Java
patch

Oracle rushes out emergency Java patch
Posted on Feb 04, 2013 01:44 pm If you’re still among the users…computer, be
advised that Oracle has released a critical patch update for Java SE
(Java 7 Update 13) on Friday. …

Feb 18, 2013

Facebook disables Java after
hack

Facebook disables Java after hack
VentureBeat The malware came through another issue with Java…Department
of Homeland Security even recommended that people uninstall Java since
hackers were finding new …

Feb 20, 2013

Apple issues malware removal tool today,
attacked

…tool today The Verge “Apple has identified
malware which infected a limited number of Mac systems through a vulnerability
in the Java plug-in for browsers,” the company said in its statement.
“The malware was employed in an attack against Apple and other companies…

Apple victim of malware
attack

…malware attack. A small number of systems inside
the company were compromised. The malware attack was tied to a vulnerability in
a Java plug-in for browsers, Apple said in a statement sent via email.
“There is …

Feb 22, 2013

US-CERT Updated Release of the February 2013 Oracle Java
SE Critical Patch Update

…Current Activity – Updated Release of the
February 2013 Oracle Java SE Critical Patch Update —–Original
Message—– From…an updated February 2013 Critical Patch Update for Oracle
Java SE to address a vulnerability. This vulnerability could allow…

Apple Releases Code To Remove Java Hack
Malware

Apple Releases Code To Remove Java Hack
Malware Fast Company In the wake of this attack Apple…malware. The Apple hacks
happened when a vulnerability in Java, …

Latest Mac malware attack shows that Windows 8 is more
secure ?

…blog) Apple has admitted that Macs inside the
company were recently victimized by a malware attack. They were hacked in a
drive-by Java exploit. In response, Apple patched the security hole in
older systems vulnerable to the attack, and also released a tool …

Uninstalling the Terrible Ask
Toolbar

…your computer, don’t be ashamed – it could
happen to anybody. Especially considering that is bundled with the equally awful
Java runtime. Those people should be ashamed of themselves. ….

Mar 2, 2013

Java malware sets its sights on your Minecraft
passwords

Java malware sets its sights on your
Minecraft passwords Geek This piece of malware is quite a bit more
sophisticated, too. It’s made of multiple Java applets that are hidden
after being dropped onto a compromised system. The tool…

New Java 0-day exploited in ongoing
attacks

New Java 0-day exploited in ongoing attacks
Posted on Mar 01, 2013 03:48 pm FireEye has detected yet another Java
zero-day vulnerability being exploited in attacks in the wild. Affected
updates…

%d bloggers like this: