TechBlog

Security News? Just a few clicks away

Monthly Archives: February 2011

Vulnerability in PDF Reader – from Foxit

This time a new security vulnerability has been found and already fixed with an updated version within the alternative PDF reader from Foxit.With providing manipulated PDF files for example via email or web sites, users of outdated versions Foxit PDF … Continue reading

Dutch phishing for Visa and Mastercard

We have posted already about Visa and Mastercard scams in English. We don’t see very often a dutch phishing campaign which is created after some known English phishing. Usually, Dutch phishing is related to the most important banks in Holland, … Continue reading

Improve your Security #3: Online Protection

It is usually said that those who are behind a hardware router are protected from any danger. This is true in regard to the connections that come from outside but it is not true for the dangers which come from … Continue reading

Phishing, Spam and Malware Statistics for January 2011

A little late this time, but here are our statistics about the phishing, spam and malware situation in January 2011! Most abused TLDs While the numbers for Phishing in December were almost all red, showing a dramatic drop for the … Continue reading

Malware signed with fake Avira Certificate

While analyzing new malware samples we stumbled over a sample which contains a digital Avira signature. Something we need to check! Viewing the properties of the digital signature, Microsoft Windows shows a note “A certificate chain processed, but terminated in … Continue reading

New Facebook feature loosens Privacy

The social network again added a new feature which gets activated automatically country-by-country. This time it is “Instant Personalization” which will be enabled on web sites like Bing. This loosens the privacy settings of Facebook again. The feature can be … Continue reading

Critical Java Update and a new Windows Vulnerability

Multiple security vulnerabilities have been found within the current Java runtime environments, both for client computers and for servers. These allow attackers to infect computers for example with a Trojan just by luring victims into visiting manipulated websites. Oracle now … Continue reading

New types of online pharmacy spam

Just when I started to think that the new spam mails are getting increasingly fancy, I found out to be wrong: The email below has only one GIF picture attached to it and the website address is written into the … Continue reading

Small change on Facebook – big impact

Without further notification Facebook changed the default behavior of how the messages of friends get presented to the user. By default, now only status updates of friends the user frequently interacts with are shown. This often leads to a quite … Continue reading

Old tricks, new language: “Paypai” in German

It has been a while since I last saw this old trick using the resemblance between capital letter “i” and small letter “l”. This time, however, the web page is no longer active as in the past, being only used … Continue reading