archives
August 2010

MotoSpeak and Sing and Run Random Apps?

In addition to recently getting a Droid 2, I purchased a Motorola H17txt Bluetooth headset. When used with a Blackberry or an Android based phone you can download and install an application called MotoSpeak that will read text messages and emails through the H17TXT. Before you go looking for such a headset be warned, there

You Have to be a Real Cool Cat!!!

You have to be a real cool cat to get into the Cambridge Who’s Who registry. A few months ago I received a spam message from whoswhopublication@gmail.com.  A legitimate Who’s Who organization is very unlikely to be using a Gmail address and they wouldn’t have sent the email to AskESET. Here’s the email: You were

Facebook ‘em, Danno*

Will I no longer be able to blog from my Netbook, or my antique iBook or Lifebook? Will I have to tear up my addressbook and insert appropriate spaces into the title page of the Handbook of Computer Security, to which I was a contributor? If I don’t do all these things, will Facebook go after my chequebook?

Cell Phone Telemarketing Hoax

You may have received an email message that looks something like this. (ESET was just asked about it – thanks to Chris Dale for passing it on.) Please note: this is, if not an out-and-out hoax, a very misleading message. Don't act upon it until you've read the rest of this article. REMEMBER: Cell Phone

Open Source Malware Fingerprinting – Free Tool

In my ever-widening circle of anti-cybercrime methodology this particular approach to attribution of the criminals looting the free world makes me particularly gleeful and I can’t wait to spread the good news: Security company HBGary today released an open source tool to digitally fingerprint malicious code and help identify the source of the malware. The

Share Your Password, Spam Your Friends

Time and time again security experts warn you not to share your password with anyone, yet sites like Facebook are always encouraging you to give them the password of an account that is not a Facebook account… your email account. You’ve probably seen the screen shot below on your Facebook friends page. It is asking

DLL loading vulnerability

Scarcely had we got our breath back mainly after Microsoft addressed a serious vulnerability in handling .LNK (shortcut) files, before researcher HD Moore made public a serious security failure in the dynamic loading of libraries in Windows that came to light when he was investigating the .LNK issue.

AMTSO’s next meeting

…quite a few other issues have come up that are less obviously related to AMTSO’s aims, and it’s probably inevitable that some of those concerns will find their way out in the course of the meeting. Watch this space.

The Strange Case of the Droid 2 Password Lock

When I first got my Droid I went to set up my security. The first thing I do with a new mobile phone is set it up to require a password to unlock the device. I also set a timeout so that after a few minutes of inactivity the phone will automatically lock itself. If

Adobe Updates

Adobe has just released an update for 20 vulnerabilities in Shockwave Player, most of which could allow an attacker to execute malicious code. The bulletin APSB10-20 – Security update available for Shockwave Player – refers. According to Jeremy Kirk's Macworld report and the Adobe advisory, the vulnerabilities affect both Windows and OS X versions up to

21st Century Hunter-Killer UAV Enters Restricted DC Airspace – Skynet Alive?

Navy UAV Goes AWOL – SkyNet has not yet been blamed and there was no word about whether this Fire Scout drone was carrying its armament load-out of the Advanced Precision Kill Weapon System or Hellfire missiles.

Android Application Security

Installing an application on an iPhone is a bit different than installing an application on an Android based system. With the iPhone you go to the App Store, select your application (and pay if required) then download and install it. For the Android based phones you go to the Android Market, select your application, download

I’m Picking Up Good Vibrations

As I previously blogged, there is a serious security flaw in the way that the Android 2.2 OS is implemented, at least on the Motorola Droid 2. If you want to require a password to unlock the phone, and you hit the lock key, it takes at least two minutes before unlocking the phone will

Facebook Friending Gets A Guy Some Jail Time

Believe it or not, this cybercrime has some twists reminding all of us to beware the estranged techie ex who decides to hack email or instant messaging accounts and then escalate to Facebook friending. Enter Harry W Bruder. This handsome devil is in his mid fifties, proving that not every Facebook user is a college

Will France Spy on You?

Apparently France has some new legislation surrounding pirated software. I applaud reasonable approaches to combating piracy, but it appears that France may be ready to make public the answer to the question “Will Anti-virus ignore government Trojan horse programs?” I first saw the story at http://yro.slashdot.org/story/10/08/05/152255/Tech-Specs-Leaked-For-French-Spyware and the story was picked up from http://www.techdirt.com/articles/20100804/04205910492.shtml. If

Inter-Species Marriage

This old dog is learning some new tricks, and no, I am not talking about animal husbandry or bestiality. In the past few months I got a MacBook Pro, switched from Windows XP to Windows 7 and now I have a Droid 2 attached to my hip, so technically I am not married to an

When Hell Freezes Over!

I received an email today that was funny to me, but not to someone who is unsuspecting. I’ll let you read it. —–Original Message—– From: Ann Price [mailto:ann.price@topspot-promotions.net] Sent: Thursday, August 12, 2010 7:14 AM To: AskESET Subject: Placing advertisements on blog.eset.com Greetings, Topspot-Promotions, an established advertising company, would like to pay you for placing

Anaconda, or a Monty Python sketch?

…you might wonder how a South American snake came to swallow an African mammal in the first place. (Don’t bother with the jokes about zoo viruses. I got there first.)

How to Screw Up and Skew a Test

Even as AMTSO attempts to bring some qualified and competent guidance to testing methodologies, and individuals with an agenda or paranoia invent stories about why it is not good, we see more completely incompetent testing. I refer this time to the test that Steve Ragan wrote about at http://www.thetechherald.com/article.php/201031/5979/Anti-Virus-industry-lacking-when-it-comes-to-detection-says-report. The test performed by Cyveillance, who

How Much Security Do You Need?

Recently I received the following question from a reader: Hello Randy, I use Verizon Wireless  Broadband on my Vista OS laptop . For security I use NOD32 Anti Virus and Windows Firewall. Are these adequate or do I need any other security tools? The short answer is “I don’t know”. Why don’t I know? Because

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.