Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3114
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3072
Total: 3074









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: s3ducx0n
« on: 20. May 2009., 16:27:49 »

symantec...

im using the ghost of symantec..

that was my first time i used it..

and still im using it..

yeah
Posted by: sparksss
« on: 20. May 2009., 08:55:44 »

i don't like it anyway, it makes my pc too dam slow
Posted by: georgecloner
« on: 14. April 2009., 07:34:03 »



If you worry that the Internet is a scary place full of digital pickpockets and online identity thieves, your fears will be bolstered by the latest Symantec Internet Security Threat Report released Tuesday.

The report finds huge increases in the number of security holes in software and the number of Internet threats, particularly attacks in which browsers are hijacked and forced to download malicious programs as people surf the Web.

Even visiting trusted Web sites isn't always safe. Most Web-based attacks target visitors to legitimate Web sites that have been compromised and that either serve up malicious content to the visitor or embed a malicious and invisible iframe on the page that surreptitiously redirects the user's browser to another Web server under an attacker's control, according to the report.

Attacks are traded in underground channels, with people buying and selling software that automates attacks or even entire botnets of infected computers that serve as spam armies, the report says. Stolen data is then marketed and offered up with price lists and guarantees. Oddly, the price of stolen data remained the same in 2008 despite the fact that the economy took a nose dive, said Zulfikar Ramzan, a technical director at Symantec Security Response.

The top Web-based attack in 2008 exploited the Microsoft IE ADODB.Stream Object File Installation Weakness vulnerability, while the top attacked vulnerabilty was the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability, according to the report.

Here are other highlights for 2008 from Symantec's report:

Conficker
Infections of Conficker, also known as Downadup, have been particularly strong in Asia Pacific and Latin America, areas with some of the highest rates of software piracy. Pirated versions of software can not be automatically updates to receive security patches. The worm, which has infected millions of Windows-based PCs that are not patched, is now communicating with other infected machines via peer-to-peer, dropping a mystery payload and installing malware that masquerades as anti-virus software.

Identity fraud
Nearly 80 percent of confidential information threats exposed user data and 76 percent used used keystroke-logging to steal data like banking account credentials. Seventy-six of the phishing attacks attempted to lure victims to specific financial sector brands and one group--the Russian Business Network--is believed to be responsible for about half of the phishing incidents that occurred worldwide last year.

Twelve percent of all data breaches exposed credit card information, which is the most popular item for sale in the underground economy. Credit card data can range in price from 6 cents to $30, while bank account credentials range from $10 to $1,000 and e-mail accounts from 10 cents to $100. Most of the stolen credit card data for sale is from the U.S.

Most data breaches that could lead to identity fraud were in the education sector, while the financial sector was the top industry for identities exposed. Theft or loss of equipment accounted for nearly half of data breaches that could lead to identity fraud and for 66 percent of identities exposed.

Spam

The most common type of spam detected was related to Internet- or computer-related goods and service. Spam volumes rose nearly 200 percent in 2008 to nearly 350 billion messages in 2008. Botnets were responsible for distributing about 90 percent of all spam e-mail.

Malware spikes
Symantec detected nearly 1.66 malicious code threats, which represent 60 percent of the 2.6 million total malware threats Symantec has detected since it has been tracking this. The number of new malicious code signatures grew by 265 percent from 2007. Trojans make up nearly 70 percent of the volume of the top 50 malicious code samples.

Vulnerabilities up
Symantec documented nearly 5,500 vulnerabilities in 2008, up nearly 20 percent over 2007 and 80 percent of documented vulnerabilities were classified as easily exploitable.

Safari had the longest window of exposure between when the exploit code was released for a vulnerability and when a vendor released a patch, with a nine day average, while Mozilla had the shortest with a less than one day average. Mozilla browsers were affected by 99 new vulnerabilities in 2008, followed by 47 in IE, 40 in Safari, 35 in Opera and 11 in Google Chrome. There were 424 browser plug-in vulnerabilities and ActiveX accounted for most of those.

Geographies
Most attacks originated in the U.S. and the U.S. was the country most frequently targeted by denial-of-service attacks. China had the most bot-infected computers and Buenos Aires was the city with the most bot-infected computers.

Critical infrastructure
Telecommunications was the top critical infrastructure sector for malicious activity, accounting for 97 percent of the total, and the most common type of attack was denial-of-service. The top country of origin for attacks targeting the government sector in the U.S. was China. Symantec documented 6 public SCADA vulnerabilities in 2008.

{CNET}

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023