Virus Information News

 Title   Date   Author   Host 

ICANN Announces DNSSEC Deployment in Root Zone of DNS
WHIR Web Hosting Industry News
by David Hamilton
January 28, 2010

In an important milestone, the three organizations spanning business, government and non-profit sectors have enabled DNSSEC information to now be served by L-Root, one of the Internet's 13 root servers, operated by ICANN.

According to the announcement this week, ICANN collaborated with the Commerce Department's National Telecommunications and Information Administration and VeriSign, Inc. in an effort to bolster the deployment of DNSSEC in the root zone of the Domain Name System, which is vitally important to the proper operation of almost all services on the Internet. DNSSEC deployment in the root zone is the biggest structural improvement to the DNS to happen in two decades according to ICANN. The Internet's technical community has been widely involved in the rollout of DNSSEC to make sure that any unintended consequences of the deployment can be identified and mitigated promptly. ICANN engineers executed a maintenance procedure to introduce DNSSEC data into L-Root between 1800-2000 UTC on Wednesday. The maintenance was completed as planned. The reaction of the root server system as a whole to the change is being closely monitored, with root server operators performing extensive data collection and analysis coordinated by DNS-OARC, the Domain Name System Operations Analysis and Research Center.

New Zero-Day Threats and High Spam Levels: MessageLabs Report
WHIR Web Hosting Industry News
January 22, 2010

According to a report released last week by Symantec, 83.4 percent of spam at the end of 2009 originated from botnets. Around 900 million spam emails, originated from free webmail accounts, and more than 79 percent of webmail spam came from three well-kno

"Despite the best efforts of the webmail providers to prevent this abuse of their services, there is still a viable market in the underground economy for buying and selling legitimate and usable webmail accounts," Symantec Hosted Services MessageLabs Intelligence senior analyst Paul Wood said in a statement. Last month, a new zero-day vulnerability in a popular version of a .PDF viewer was found to target high-level individuals in the public sector, education, financial services and large international corporations. It arrives as a .PDF file containing embedded malicious Javascript code. The attack also had a social engineering aspect -- the attack varied according to the individual and organization being targeted, making it seem legitimate. MessageLabs Intelligence actually blocked the first versions in November 2009, protecting Symantec Hosted Services customers from the attack before it began.

Chinese Search Engine Baidu Sues Its US Web Host Over Hacking Incident
WHIR Web Hosting Industry News
January 20, 2010

Following a January 12 attack that left Baidu's main search engine inaccessible for several hours, Baidu announced on Wednesday that it had filed a lawsuit against and that it was actively seeking a new hosting provider for its search engine.

"The fault of led to the malicious and unlawful altering of the domain name of Baidu, which made thousands of people unable to visit and brought serious losses to Baidu," the company stated. Last week, Baidu searches were reportedly redirected, and its homepage carried the message, "This site has been hacked by Iranian Cyber Army." This suggests that it was the same group that hacked social networking site, Twitter, last month.

Network Solutions Responds to Site Defacements
WHIR Web Hosting Industry News
January 20, 2010

After hackers defaced hundreds of websites hosted by Network Solutions, the company said Tuesday that it is monitoring this threat and working with law enforcement organizations as it works to restore the impacted sites. "We have discovered the cause of a

"Hackers were able to add a file displaying illegitimate content on top of the customer website content. This was an issue on multiple servers and unknown intruders were able to get through by using a file inclusion technique. There was no danger to any personally identifiable or secure information." Bellamkonda noted that after this issue is sorted out, Network Solutions will be undertaking precautionary actions that may include some server configuration modifications.

Spammers Exploit Free Web Hosting Services
WHIR Web Hosting Industry News
by David Hamilton
January 11, 2010

Temporarily benefiting from a host's legitimate reputation, spammers are taking advantage of "free-hosting" services for their nefarious purposes.

In its January 2010 Spam Report, McAfee made note of the growing trend of spammers signing up for free subdomains and complimentary hosting. Oftentimes they are allowed to use a unique third-level domain, giving them the appearance of a legitimate site. "Using a free hosting service is a good tactic for spammers because it is easier to automatically block a new infected website than to block a site that has been around for a longer period and has possibly had legitimate traffic associated with it," wrote the McAfee report's authors. "This edge can provide spammers a few precious additional hours before the spam-blocking services of the world blacklist that host. In the course of a few hours a botnet can generate billions of messages." With long-time free hosting site Geocities shutting its doors just months ago, dozens of similar free hosting sites have sprung up to provide free web space to anyone who requests it. Unfortunately, spammers have requested a lot of it.

Beware of Anti-virus Scam
WEEK News 25
by Gina Ford
December 5, 2008

An aggressive virus has been affecting computers nationwide, and it's a growing problem. It even took one of our computers down in the newsroom.

It is indeed an aggressive virus, and it's known as M-S Anti-virus...the latest version is 2009. It's a scam...the makers lure people into believing it's a protection tool and con unsuspecting people into buying it.

Terror watch list grows to 875,000
by Shaun Waterman
May 3, 2013

The number of names in a secret U.S. database of suspected terrorists has swollen to 875,000 from 540,000 only five years ago, in part because of rule changes introduced after al Qaeda's failed underwear bomb plot in 2009.

The new figures were released Friday by the U.S. National Counter-Terrorism Center, which manages the database, the Terrorist Identities Datamart Environment, or TIDE. A senior intelligence official explained the changes to The Washington Times. "It's absolutely not unwieldy," the official insisted. He was seeking to rebut charges that the growing size of such a database actually makes harder the work of finding real terrorists - what critics call the "larger haystack, same number of needles" problem.

New software uses smartphone camera for spying
by Shaun Waterman
October 2, 2012

Researchers from the U.S. Naval Surface Warfare Center have developed malicious software that can remotely seize control of the camera on an infected smartphone and employ it to spy on the phone's user.

The malware, dubbed "PlaceRaider," "allows remote hackers to reconstruct rich, three-dimensional models of the smartphone owner's personal indoor spaces through completely opportunistic use of the camera," the researchers said in a study published last week. The program uses images from the camera and positional information from the smartphone's gyroscopic and other sensors to map spaces the phone's user spends a lot of time in, such as a home or office.

The president is wrong: The NSA debate wouldn't have happened without Snowden
by Timothy B. Lee
August 9, 2013

At Friday's news conference, President Obama was asked by Chuck Todd whether the debate that has arisen in the wake of Edward Snowden's revelations made Snowden a patriot. Obama disagreed.

"I don't think Mr. Snowden was a patriot," the president said. "I called for a thorough review of our operations before Mr. Snowden made these leaks. My preference, and I think the American peoples' preferences would have been for a lawful, orderly examination of these laws." Yet the Obama administration showed little interest in subjecting the NSA to meaningful oversight and public debate prior to Snowden's actions. When Sen. Ron Wyden (D-Ore.) asked for a "ballpark figure" of the number of Americans whose information was being collected by the NSA last year, the agency refused to give the senator any information, arguing that doing so would violate the privacy of those whose information was collected.

Justin Amash votes against his own bill, the USA Freedom Act
by Ashe Schow
May 22, 2014

Unhappy with last-minute changes made to a bill designed to end the National Security Agency's bulk collection of American's phone and Internet records, Rep. Justin Amash voted against the bill.

The Michigan congressman, who was an original cosponsor of the USA Freedom Act, said he was "proud" of the work he and others did to promote the bill, but that he could not support the draft legislation as it is currently written. "This morning's bill maintains and codifies a large-scale, unconstitutional domestic spying program," Amash wrote on his Facebook page. "It claims to end ‘bulk collection' of Americans' data only in a very technical sense: The bill prohibits the government from, for example, ordering a telephone company to turn over all its call records every day."


Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2023 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security

AddThis Social Bookmark Button