Friday, February 03, 2006

AIM Virus - AOL IM Virus Removal - AIM Profile Virus Remover

AIM Virus - AOL IM Virus Removal - AIM Profile Virus Remover: "AIM Profile Virus Removal
Manual Removal Instructions:

Press the CTRL, ALT, and DEL keys at the same time to bring up the task manager.

Click on the processes tab (windows 2000/XP), and find 'b.exe', 'bbb.exe' or 'av.exe' and kill the process.

Go to C:Windows and delete 'b.exe' and 'bbb.exe' or 'av.exe' (or do a search for the virus: click Start > Search > look up each virus individually) Delete these files when you find them.

Click Start, then click on Run, type in 'Msconfig' in the box and press ENTER.. When the box comes up, click on the 'startup' tab and look for 'b.exe', 'bbb.exe' or 'av.exe' listed (possibly listed under'antivirus') then uncheck the box to the left. (Windows 98/XP only)

Clear your profile (or make a new one) and restart.

When the msconfig box comes up after restart just check the box telling it not to come up again."

Tearec.A Blackworm Does Little Damage So Far

Blackmal computer timebomb causes little damage

AMSTERDAM (Reuters) - A computer virus that was designed to start its malicious work on Friday did not cause the mayhem that was anticipated, computer security firms said.

The worm, known as "Blackmal" and "Kama Sutra," hides inside email attachments and contains a time-activated payload due to execute on the third day of each month, first occurring on Friday.

Once activated, the worm will try to spread itself, attempt to stop anti-worm software from running and try to delete all Word, Excel, PowerPoint and PDF file types from an infected PC.

Rather than disabling up to 500,000 PCs that were expected to be infected, the virus had hit only a few thousand computers by midday in continental Europe, mostly from individual consumers, according to several computer security firms.

Advance warnings by virus security firms and enterprises to their customers and employees appeared to have worked.

"This is certainly not a disaster," said technical consultant Graham Cluley at British virus fighter firm Sophos.

Rival security software firm Symantec confirmed "the worm is not spreading wildly and infections are relatively low."

The virus is also known as "Nyxem," "MyWife," and "Tearec."

Thursday, February 02, 2006

180 Solutions Sued Over Adware Tactics

In a 91-page federal complaint fairly quivering with frustration, the Center for Democracy and Technology last week took on 180solutions, accusing the adware company of acting in a "brazenly reckless" manner in getting its software on desktops.

The consumer advocates at CDT allege that 180solutions consistently ignores the fact that partner after partner uses 180solutions' adware to install pop-up ads on the computers of users who haven't given their informed consent.

While the complaint filed with the Federal Trade Commission last week concedes that 180solutions has responded to some concerns, the main problem appears to be that it does so only when it is pressured.

New problems continue to arise because the fundamental business model doesn't discourage bad installations -- at least according to the CDT and consultants like Eric Howes, who runs the anti-spyware Web site

The CDT's move also raises questions about the future of adware. Some observers, like Howes and adware consultant Ben Edelman, maintain that few consumers want adware on their computers.

Therefore, they say, companies like 180solutions are forced into a business model that at least tacitly rewards trickery.

"The only way they can get it on computers, so they can make money, is to sneak it on," Howes said.

Wednesday, February 01, 2006

BlackWorm (Tearec.A) Attacks Friday Feb 3rd

Threat Level: HIGH

PandaLabs has detected that all computers infected with BlackWorm will encounter widespread damage this Friday, Feburary 3.

BlackWorm, also known as "Tearec.A", "Mywife.E" and "KamaSutra" will corrupt all Microsoft Word, Microsoft Excel or Microsoft PowerPoint files on infected computers.

Don't wait to check if your computer contains Blackworm.

Panda Software recommends running an online virus scan immediately.

FREE VIRUS SCAN:Scan your computer for Blackworm.

Network Security: Spyware & Patch Management

Windows IT Pro Whitepapers: "Spyware and Patch Management: An Integrated Approach to Network Security

Exploiting security vulnerabilities in order to install spyware is the norm, not the exception. Yet nearly all spyware solutions treat the symptom without addressing the cause.

By viewing these issues together, spyware and patch management, IT professionals stand a better chance of maximizing network security against Spyware and other threats. This white paper addresses the need to manage threats and vulnerabilities in one console as a comprehensive security solution.

The impact of spyware on the enterprise is severe: surging bandwidth consumption, system instability, overwhelmed help desks, and lost user productivity are just a few of the unwelcome side effects. Unauthorized applications can even result in non-compliance with regulatory requirements. Even worse, much of today's spyware install keyloggers and backdoors that compromise security and lead to financial risk.

Today's solutions are largely desktop-based and nearly all treat the symptom without addressing the cause. Many of these malware irritants take advantage of unpatched flaws in the OS or browser to install their tools.

Removing the spyware, and malware is the first step to securing the system, but enterprise anti-spyware tactics are only successful when combined with system updates that prevent re-infestation. Remediate spyware and install patches with Shavlik NetChk Protect for a complete security solution. "

Tuesday, January 31, 2006

WinAmp Security Flaw Upgrade Fix Available

WinAmp has a major security flaw. The new version, 5.13, of Winamp, an MP3 and multimedia player used worldwide, is now available. As the new version fixes a critical security flaw, we recommend Winamp users install this update immediately.

The vulnerability lies in a buffer overflow, which occurs when processing over-long .PLS file names. This flaw could allow a remote user to run arbitrary code and therefore, compromise the security of affected systems.

What's more, an exploit (*) has been published, which increases the risk of attacks that take advantage of this vulnerability.

The vulnerability has been confirmed in Winamp 5.12, but previous versions could also be affected. Users of Winamp are advised to install version 5.13, which is available at:

(*) Exploit: technique or program that exploits a security flaw- a vulnerability- in a certain communication protocol, operating system or IT tool.

Monday, January 30, 2006

Google's New Badware Site Is Lame

New York Newsday Article: "Though it was overshadowed last week by news that Google is going to censor its Chinese search engine and protect the privacy of pedophiles in the United States, another bit of Googlish news caught my eye: The company is funding a big, new academic effort at Harvard and Cambridge to combat spyware and adware, which the new organization has decided to call 'badware.' Read about it at the new Web site,

According to the site, ' is a 'Neighborhood Watch' campaign aimed at fighting badware.' It says the organization 'will seek to provide reliable, objective information about downloadable applications in order to help consumers make better choices about what they download onto their computers. We aim to become a central clearinghouse for research on badware and the bad actors who spread it, and become a focal point for developing collaborative, community-minded approaches to stopping badware.'"

Sunday, January 29, 2006

Hacker Arrested in AOL Phishing Scam

Arrest Made in AOL Phishing Scheme

A 45-year-old California man was arrested Jan. 25 and charged with operating an online phishing scheme that targeted America Online customers.

Jeffrey Brett Goodin of Azusa, Calif., was arrested and charged with wire fraud and unauthorized use of a credit card. He could face 30 years in prison if convicted of both offenses.

Goodin is alleged to have sent e-mail messages to thousands of AOL users to entice them to visit fraudulent Web sites he set up to collect personal information.

Goodin allegedly used the information he gathered to make purchases with the credit cards, according to a statement from Debra Yang, U.S. Attorney for the Central District of California.
Goodin was arrested following an investigation by the U.S. Secret Service, FBI and the Ontario, Canada, Police Department.

He is scheduled to be arraigned Jan. 28 in U.S. District Court.