Saturday, December 03, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Apple Sent Letter NHTSA Asking About Autonomous Vehicle Guidelines
Apple Blames Battery For Random iPhone 6s Shutdowns
Microsoft Stores Reveal Xbox Discounts And Offers
Researcher Bypasses The iOS Activation Lock
Facebook To Offer $20 million To Improve Silicon Valley Communities
Xiaomi Launches Voice -controller Mi Wi-Fi Speaker
Xiaomi "Denies" Mi MIX Nano Existence
Nokia D1C Specs Leak
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Hackers...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, April 12, 2005
Hackers Exploit Windows Update Publicity


Users might be particularly vulnerable to e-mails claiming to be from Microsoft this week.

On April 12, Microsoft will make the Windows XP Service Pack 2 upgrade automatic for any machine that accesses the Windows Update utility at Microsoft's official update site.

Much has been made in recent weeks of the upcoming deadline for Windows XP users to update their operating systems with the large Service Pack 2 update.

Now, malicious hackers appear to be exploiting the public's concern over updates by distributing a bogus link to a Windows Update site.

The site, when accessed from an e-mail posing as a Microsoft notice, installs Trojan code on the user's machine and opens a back door that allows the PC to be controlled remotely.

This virus, like many others, takes advantage of users' powerful urge to click on e-mail attachments and links, even when their origin is suspicious.

An enormous amount of virus traffic on the Internet could be stopped if e-mail recipients simply would stop doing so, Graham Cluley, senior technology consultant with security firm Sophos, said.

Day of the Zombies
The current Trojan program, labeled TrojDSNX-05, can be used by hackers to make the PCs of innocent users into "zombies," said Sophos.

Zombie computers typically are used by the originators of spam to cover their tracks. Malicious hackers use infected machines to send enormous amounts of bulk e-mail or use the compromized systems in large-scale distributed denial-of-service attacks.

However, the code that underlies the virus actually has been known for some time. Those that have appropriately updated antivirus software should find that their security programs catch the malicious code, even if it is inadvertantly downloaded.

Windows Deadline
Users might be particularly vulnerable to e-mails claiming to be from Microsoft this week. On April 12, Microsoft will make the Windows XP Service Pack 2 upgrade automatic for any machine that accesses the Windows Update utility at Microsoft's official update site.

Many users have the automatic update feature on their operating systems turned off, but they might encounter a prompt to update when they access the site for other patches.

The SP2 update is not much of a problem for home users, say security experts. But many enterprises have avoided the update actively due to compatibility problems with other enterprise applications or network architecture issues.

From TopTechNews



Previous
Next
Microsoft sets date for Xbox 2 debut        All News        Mobile phone sales up 4.5% in 2005
Adobe extends Linux support with Reader 7.0     General Computing News      Wireless USB 1.0 spec to be finalized next month

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
U.S.Navy Disclosed Security Breach In Its Systems
Hackers Probed Voting Systems, U.S. Says
Hackers Accesssed Customer Credit Card Data From Acer Store
Mark Zuckerberg's Social Media Accounts Were Hacked
Hackers Steal, Sell Verizon Enterprise Customer Data
U.S IRS Discovers More Data Had Leaked In Last Year's Cyberattack
Cisco Routers Vulnerable To Attack: researchers
Researchers Showcase Javascript-based Attack On a Computer's DRAM
Hackers Used Twitter hashtags To Extract Data From Compromised Networks
Hackers Could Break Into Your Android Smartphone With A Simple MMS
Government Personnel Data Hack Exposed Of Millions Of People
Kaspersky Lab Was Hacked

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .