Search Results for
BEC
Ani exploit plus Heap Spraying
Today we have detected a server exploting the last ani vulnerability with the known “Heap Spraying” technique. The ani file exploits the vulnerability nevertheless there…
Insecure features : should AV companies detect them?
These days we have been analyzing one of the latest MySpace threats, JS/MySpace.A, which uses an interesting QuickTime feature : HREF Tracks. A deep analysis…
Malware, Banks & Google Maps
Yesterday, we detected a downloader that focused media attention because it was spammed using some "curious" subjects: # "Current Australia’s Prime Minister survived a hear…
MS deny the execution of IE7 if the executable file name isn't iexplore.exe
Some days ago, while we were doing some of our research, we discovered a strange IE 7 behavior or "feature". We were trying to execute…
January Spyware List
Today we are going to review our top spyware list. 1: Adware/Gator(=) 2: Adware/Lop (Up from 8th)3: Application/MyWebSearch (Up from 5th) 4: Application/Winantivirus2006 (Down from…
Nurech.A.worm Alert II ( UPDATE )
We have compiled more information on this alert. Here you have a graph of the continuous arrival of messages to the lab related to this…
Spam in PHP forums
Today we have found that in a php forum, someone was posting spam messages. It was obvious in this particular case, because it was a…