In response to the volume of malware exploiting Adobe products, Adobe Reader X was released last week with its much anticipated new security feature, Protected Mode.
Protected Mode is based on Microsoft’s "Practical Windows Sandboxing" technique which you can read about here.
What does Protected Mode do? It displays PDF files in a highly restricted and confined environment. The restricted environment will help prevent a booby trapped PDF file from doing anything to your system.
SecurityInspector2010 is a new rogue anti-virus application. It is a another clone of DesktopDefender2010.
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 for Android. These vulnerabilities, including CVE-2010-3654 referenced in Security Advisory APSA10-05, could cause the application to crash and could potentially allow an attacker to take control of the affected system.
Full Adobe advisory info here.
Affected software includes:
Microsoft has released a security advisory concerning a vulnerability affecting Internet Explorer versions 6, 7 and 8. This vulnerability may allow an attacker to execute arbitrary code. Full details here.
Visit Microsoft's page here to get full instructions. You can find the workarounds under the "Suggested Actions" twisty.
Over Halloween we saw the usual glut of malicious sites hijacking spooky search engine results. Today looks to bring some more search engine result hijacking opportunities for the bad guys.
Adobe have published details of a critical vulnerability the following applications.
Adobe Flash Player 10.1.85.3 and earlier versions
Adobe Reader 9.4 and earlier 9.x versions
Adobe Acrobat 9.4 and earlier 9.x versions
The vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.
From the Mozilla blog:
Issue:
Mozilla is aware of a critical vulnerability affecting Firefox 3.5 and Firefox 3.6 users. We have received reports from several security research firms that exploit code leveraging this vulnerability has been detected in the wild.
As stated by Help Net Security a new Firefox plugin, "Firesheep", can be used for "sniffing" HTTP sessions that are unencrypted. The plugin can be used for hijacking online services, such as social networks - and other online services that require a login. The Firesheep plugin makes it thereby possible for perpetrators to impersonate users by simply hijacking their sessions at services such as Facebook, WordPress,Twitter, Google, Flickr, Amazon.com etc.
- 1 of 10
- ››