Virus developers are taking advantage of the enormous popularity of the Adobe flash player and creating fake Adobe Flash player which installs Trojan horse designed to steal password and personal information. Security experts hunting for solutions as more and more people fell to the trap of upgrading the flash player and ending up in a fake site that will install Trojan horse.

Fake YouTube links; fake CCN alert emails all tries to install the updated flash player to watch the movie. Out of curiosity to view the movie, most users simply press the upgrade button and link them selves to the hackers. Latest incident tricked the user using CNN email alerts regarding an imminent cease-fire in the Israel-Gaza conflict. Last month Koobface virus on facebook sends virus to the friends list asking them to checkout one of the latest movie. Clicking on the link directs the user to download a plug-in to watch the movie. These Trojan horse programs are designed to steal financial passwords and personal details from the victim’s computer and are very dangerous.

Wake up Adobe; we love your player but not these Trojans. Help us to get the genuine updates.

Explore More

Joomla Hack

######################################################################################### Joomla 1.5.x Remote Admin Password Change ########################################################################################## ## Author: d3m0n ([email protected]) ## Greets: GregStar, gorion, d3d!k ## ## Polish “hackers” used this bug to deface turkish sites BUAHAHHA nice

LDAP Injection Vulnerabilities

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

[Tut/Sources] References to poly/meta/permutation

Articles: Polymorphic engines – Trigger – SLAM #4 Code: http://vx.netlux.org/lib/static/vdat/tupoleng.htm Polymorphism ant Intel instruction format – LiTlLe VxW – 29A #7 Code: http://vx.netlux.org/29a/29a-7/Articles/29A-7.027 Guide to improving Polymorphic Engines – Rogue