Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3056
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 3
Guests: 2963
Total: 2966









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 15. April 2010., 06:56:26 »



 Security researchers have discovered flaws in common file formats, including .zip, which can be used to sneak malware onto computers by evading antivirus detection.

Eight vulnerabilities were found in .zip, supported by Microsoft Office, along with seven others in the .7zip, .rar, .cab and .gzip file formats, said Mario Vuksan, president of ReversingLabs Corp.: http://reversinglabs.com/

The vulnerabilities could be used by attackers to hide malware that could then be slipped past antivirus software via an e-mail attachment and used to compromise a computer, he said.

"The file goes straight through Gmail or Hotmail because it's a trusted format," he added. "Antivirus software can't see the hidden payload. Once the file is opened the payload (or malware) is on the system."

Vuksan said he and his partners in the research, Tomislav Pericin of ReversingLabs and AccessData Chief Operating Officer Brian Karney, had notified antivirus firms and other security vendors about the holes so they could update their products so they would not be vulnerable to attacks: http://www.accessdata.com/
The three were set to present their findings at the Black Hat Europe conference in Barcelona on Thursday: http://www.blackhat.com/html/bh-eu-10/bh-eu-10-home.html

w They also planned to release a tool called NyxEngine that companies can use to scan the files in the network for suspicious attributes that might indicate hidden malware, Vuksan said: http://blog.reversinglabs.com/2010/04/introducing-nyxengine/

In addition to being used to attack a computer, the vulnerabilities could be used for steganography, or hiding secret messages in otherwise innocent-looking files, according to Vuksan. Typically, steganography involves messages hidden in images and photos.

(Cn)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023