Kaspersky patch for AV security hole due out today
Russian security software provider Kaspersky Labs plans to release a fix for a potentially serious hole in Windows-based antivirus software that could allow an attacker to gain control of systems running Kaspersky's products.
Security researcher Alex Wheeler reportedly informed Kaspersky on Sept. 24 that he'd found a flaw that let an intruder launch a remote attack by inserting a malformed .cab file in an e-mail to a computer protected by Kaspersky software. Kaspersky updated its AV signatures last Thursday to prevent exploitation and said yesterday a patch would be provided by today. The company also emphasized yesterday that no exploits were known to have compromised the vulnerability.
Impacted software includes Kaspersky Anti-Virus line: Personal 5.0; Personal Pro 5.0; 5.0 for Windows Workstations; 5.0 for Windows File Servers and Personal Security Suite 1.1.
SpreadFirefox.com unable to do just that, thanks to hackers
The Mozilla Foundation's Spread Firefox Web site, used to promote the open-source browser, is expected to remain offline temporarily after attackers broke into the host server by exploiting a vulnerability in another open-source tool, collaboration software called TWiki. In an e-mail to Firefox supporters, a site team said it was rebuilding the site from scratch to better secure the software running on it. It also emphasized that the main Mozilla site or Mozilla software was affected by the compromise discovered last week.
Since the Web browser first hit the market last year, Firefox has gained millions of adoptees -- many switching to avoid security woes plaguing Microsoft's Internet Explorer. However, Firefox itself has garnered plenty of attention this year with various security advisories. Mozilla hopes to prove its security's improved with the new Firefox 1.5 now in beta.
New study suggests ISPs had better protect their own
A report on a recent study found that 12% of scan attacks from more than 100 global broadband deployments were launched by their own subscribers. Sandvine, which provides anomaly detection tools for Internet service providers, said many of these machines are actually zombies controlled by botnet masters, rather than lone malicious hackers mounting their own denial-of-service attacks.
"This finding dispels the commonly held idea that all attacks come from external, off-net attackers, and that broadband only consists of policing the borders between external and internal networks," the UK-based company said in a news release. Sandvince CEO Dave Caputo implored broadband service providers such as DSL, cable-modem and wireless telecoms, to take action and "cleanse the unsuspecting attackers on the 'inside.'"
Sandvine used sample data from 20 million broadband subscribers worldwide to arrive at its numbers.
California first state to formally penalize phishers
California, the state that helped bring to light serious security breaches at data brokerages with its groundbreaking data breach notification law, is now among the state to single out Internet-based ID thieves with a new anti-phishing legislation.
Gov. Arnold Schwarzenegger recently signed the Anti-Phishing Act of 2005, which makes it illegal for anyone, using the Internet or other electronic means, to "solicit, request or take any action to induce another person to provide identifying information by representing itself to be a business" without approval from that company. Thieves must attempt to gain Social Security numbers, financial account records or access codes such as passwords or PINs. Penalties include a $2,500 fine for each violation. Victims also may sue for $500,000 per violation or more, if actual damages exceed that amount.