Virus developers are taking advantage of the enormous popularity of the Adobe flash player and creating fake Adobe Flash player which installs Trojan horse designed to steal password and personal information. Security experts hunting for solutions as more and more people fell to the trap of upgrading the flash player and ending up in a fake site that will install Trojan horse.

Fake YouTube links; fake CCN alert emails all tries to install the updated flash player to watch the movie. Out of curiosity to view the movie, most users simply press the upgrade button and link them selves to the hackers. Latest incident tricked the user using CNN email alerts regarding an imminent cease-fire in the Israel-Gaza conflict. Last month Koobface virus on facebook sends virus to the friends list asking them to checkout one of the latest movie. Clicking on the link directs the user to download a plug-in to watch the movie. These Trojan horse programs are designed to steal financial passwords and personal details from the victim’s computer and are very dangerous.

Wake up Adobe; we love your player but not these Trojans. Help us to get the genuine updates.

Explore More

critical XSS vulnerability on Accounts Chamber of the Russian Federation http://www.ach.gov.ru

PlanetCreator.Net’s Security Team Member has reported another critical XSS vulnerability on Accounts Chamber of the Russian Federation http://www.ach.gov.ru These are some information from Vulneral Site http://www.ach.gov.ru: This vulnerability has been

Timing Attacks with HTML5

HTML 5 and related technologies bring a whole slew of new features to web browsers, some of which can be a threat to security and privacy. This paper describes a

Online Services

Gathering information: (set) http://www.subnetonline.com/ (set) http://ping.eu/ (ping, dns_tools, traceroute, web_tools) http://serversniff.net/ (DIG / nslookup, whois, traceroute) http://networking.ringofsaturn.com/Tools/ (whois, dns_tools, service_scan, traceroute) http://centralops.net/co/DomainDossier.aspx (whois, dns_tools, domain_search) http://www.whois.ws/ (whois, dns_tools) http://www.robtex.com/ (whois)