Author: Robby Pedrica

  • Mubarak and Nokia ( and Sony )

    I know you’re going to say ‘what’? An Egyptian autocrat, a Swedish phone maker and Japanese electronics giant in one article? But there is a very big similarity between these 3 subjects that’s brought 2 of them to their knees, and polarised popular view against the third: CHANGE Yip, both Mubarak and Nokia have been…

  • Google to remove h.264 support from Chrome

    … and the world cried! Well maybe just the h.264 camp … So I thought I’d weigh in on  this delicate situation too and give my 2 cents. Some facts: h.264 is a standard, not an open standard due it being patent encumbered h.264 requires royalties to be paid under certain circumstances unlike VP8 which…

  • Win 7 SP1 out soon

    Windows 7 Service Pack 1 should be available soon and won’t have much new functionality, but will have the usual hot fixes and patches. 3 items that will make an appearance are: Advanced Vector Extensions ( AVX ) which will be available in forthcoming processors RemoteFX – an extension to RDP Dynamic Memory – intelligent…

  • Security Policies in the organisation

    Most organisations of a reasonable size, will today have at least some policies which integrate with HR to govern Internet and computer use within the company. However, the ability of these limited documents ( and sometimes procedures ) to protect the company is often minimal. With the extent to which malicious vectors are able to…

  • Security strikes back – NOT!

    Microsoft released their largest ever update set this Tuesday past ( a total of 17 updates to fix 40 holes ), which included fixes for all 4 Windows holes related to the Stuxnet worm. This update set includes MS10-090 which fixes 6 CSS issues in IE which have been actively exploited over the last few…

  • Breaking News: Novell Sold!!!

    So Attachmate Corp has purchased Novell for $2.2B. In addition, certain IP assets will be sold off separately for $450M to a consortium of Microsoft and others. These include the  copyrights for Unix System V which was used in defense of SCO’s lawsuit. So one wonders whether the purchase by Microsoft includes these or not…

  • IE hole has first blood drawn by Amnesty International

    The latest 0-day hole in Internet Explorer has been exploited by vulnerabilities in the Amnesty International web site. The hole itslef is related to flawed processing routines for parsing certain Cascading Style Sheet combinations in HTML documents. This allows attackers to manipulate certain pointers and execute injected code at the user’s privilege level. The new…

  • Bakbone and Falconstor

    In breaking news, Qwest has purchased Bakbone for $55m and stock options. Seeing as we have quite a lot of clients locally running Netvault, it will be interesting to see how this purchase affects the product lineup going forward. Buyouts can sometimes work, and other times fall down badly. Let’s try and be optimistic about…

  • Security vendors and their ‘secure’ products

    One typically expects security devices and products to be, well how to put it – secure? Yes, secure. But it appears that security vendors struggle with bugs and the like, almost as much as normal software. There have been a number of high profile AV definition update failures in the last year, Cisco had some…

  • Server Reboots

    A recent article offered that servers should be rebooted on a regular basis and mostly argued the case of OS updates requiring this. I think that servers should be rebooted/shutdown but only in the region of months or bi-annually. 3 reasons: a. applying of kernel patches ( unless you’re using ksplice on Linux ) b.…

  • ZeuS banking trojan now into SMS

    New versions of the ZeuS trojan are starting to target the SMS-TAN system which is used to send transaction numbers ( TANs ) to clients’ cell phones to authenticate that person for a online transaction. Now, the developers of ZeuS have pursued the last strategy to get trojans onto devices in an attack requiring multiple…

  • Poor reporting from BCS/ITnow

    I recently bumped into an article written by Steve Smith, MD of IT Security firm Pentura. After reading only the 1st paragraph, I already came to the conclusion that either Mr. Smith is clueless or purposely disseminating falsehoods about OSS security. The rest of the article is an abomination peppered with inaccuracies and complete rubbish.…

  • AV vendors offer ‘free’ LNK protection

    Aw, aren’t we lucky ( well Windows users at least ) – G-Data and Sophos have stepped forward with free protection for the .lnk vulnerability. G-Data’s solution LNK-Checker displays no-entry signs for iconss associated with exploits while other icons function as normal.However, users can still click on malicious LNK files and start the malware manually,…

  • Windows LNK vulnerability attracts more attacks

    The unpatched LNK vulnerability in all versions of Windows ( from XP onwards ) is attracting a lot more attention from malicious code authors. A further 2 exploits have been detected in the wild. The 1st .lnk trojan Stuxnet, was very specific about it’s payload, attacking Siemens SCADA software specifically. But the effectiveness of .lnk…

  • New Microsoft Windows exploit the most dangerous of all

    A new malicious attack has been spreading through the internet in the last few weeks, initially using USB memory sticks to propagate. Called, the LNK vulnerability, the attack uses specially crafted shortcut (.lnk) files, which trick Windows into running code of an attacker’s choosing. Any Windows application that tries to display the shortcut’s icon—including Explorer—will…