Nullsoft have released Winamp 5.13 in response to the critical exploit. Update Winamp as soon as possible. Download it from here.
Myantispyware team No Comment Critical patch
Nullsoft have released Winamp 5.13 in response to the critical exploit. Update Winamp as soon as possible. Download it from here.
Myantispyware team No Comment Malware removal, Updates
Bleeding Snort released an updated list of known malware-related domains yesterday, up to 9,400 entries now! For those of you employing DNS black holes, proxy-based filtering, or doing other general research of malware based on domains, you should check out this exhaustive (and exhausting!) new list. I frequently rely on this list to match against
Myantispyware team No Comment Virus
The destructive deadline of the Nyxem.E worm is based on the clock of the infected machine. So if you’re infected and your clock is not set right, things could start to happen at any time – even though the official activation time is the 3rd of the month. F secure have already received first reports
Myantispyware team No Comment Updates
This version of the SpywareGuide.com Active-X blockfile contains 3762 items and inoculates Internet Explorer against 375 different spyware and malware products. Tired of all that Spyware and Adware being installed by ActiveX but don`t want to lose out on functionality? Spyware-Guide.com has created a system that blocks all known “bad” ActiveX controls from running inside
Myantispyware team No Comment Exploits & Vulnerabilities
The vulnerability is caused due to a boundary error during the handling of filenames including a computer name. This can be exploited to cause a buffer overflow via a specially crafted playlist containing a filename starting with an overly long computer name (about 1040 bytes). Successful exploitation allows execution of arbitrary code on a user’s
Myantispyware team No Comment Free Software
Internet Explorer has a nasty habit of allowing so-called Browser Helper Objects (or BHOs) to install themselves into IE. Some BHOs are helpful, like the Google Toolbar, but others (especially those planted by viruses or spyware) can be malicious and harmful. BHODemon gives you a quick look at the BHOs installed on your PC, tells
Myantispyware team No Comment Tips
Much of the computer security industry acts like spyware is immaculately conceived. Somehow it just appears on computers, we are led to believe, and supposedly all we can do is clean up the mess after it happens, rather than prevent it in the first place. I disagree. Now, we all love Google. I use Google’s
Myantispyware team No Comment Tips
Key loggers are a particularly nasty type of malware, because they are created to monitor and record keyboard activities. They are often designed to capture the victim’s interactions with a login form of some kind, frequently targeting logon credentials for banking websites. NetSpy, identified by this spyware scan, is known to be able to log
Myantispyware team No Comment Tips
A specially crafted HTML document can cause Internet Explorer to skip the kill bit check. This means that any ActiveX control that has been disabled solely through use of the kill bit may still be used by Internet Explorer. A kill bit is a registry setting that prevents Internet Explorer from running the corresponding ActiveX
Myantispyware team No Comment Updates
AOL HAS released version 8.1 of the Netscape browser. In case you were expecting something revolutionary, or that the company listened to the users’ pleas to bring back the e-mail client or to extend Netscape 8 to other operating systems, Netscape 8.1 offers no very good news for you: it’s still Windows-only, and it’s still