Tag Archive for: form

IE users get new protection against potent form of malware attack

a_codepoet

Microsoft developers have fortified Internet Explorer with new protections designed to prevent a type of attack commonly used to surreptitiously install malware on end-user computers.

The “isolated heap for DOM objects” made its debut with last week’s Patch Tuesday. Just as airbags lower the chance of critical injuries in automobile accidents, the new IE protection is designed to significantly lessen the damage attackers can do when exploiting so-called use-after-free flaws in the browser code. As the name suggests, use-after-free bugs are the result of code errors that reference computer memory objects after they have already been purged, or freed, from the operating system heap. Attackers can exploit them by refilling the improperly freed space with malicious code that logs passwords, makes computers part of a botnet, or carries out other nefarious behavior.

Use-after-free flaws are among the most commonly exploited, often at great expense to end users. Recent in-the-wild attacks that targeted IE versions 9, 10, and 11 capitalized on a use-after-free bug. The bug class has been at the heart of many other real-world attacks on IE that are too numerous to count. (They have also been known to bring down Google Chrome and Mozilla Firefox.) Wei Chen, an exploit developer with Rapid 7’s Metasploit vulnerability framework, likens use-after-free exploits to sneaking tainted cookies into an already-opened bag of Oreos.

Read 5 remaining paragraphs | Comments


Ars Technica » Technology Lab

Google unenthusiastically launches ‘right to be forgotten’ request form

Today, Google unenthusiastically launched a service that allows European citizens to request the removal of links that include their name and which are deemed “inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed.” Google’s Larry Page slates the ruling as harmful to internet start ups and favourable to “oppressive governments”.
Naked Security – Sophos

Attack is the best form of defence in cyber warfare – BCS

Attack is the best form of defence in cyber warfare
BCS
A new study by cyber security firm LogRhythm has revealed that 65 per cent of the British public would be in favour of launching pre-emptive strikes on enemy states if they pose a threat to national security. It would seem the level of concern over

cyber warfare – read more

Big media and ISPs form alliance to crackdown on IP pirates

John P. Mello, Jr.

Top Priority Sector: 
cyber_security

Image Caption: 

O’Leary: pirates
steal jobs

Major Internet Service Providers and organizations representing the makers of movies and distributors of music announced on July 7 that they had inked a pact creating a warning system that they hope will strangle the audience for pirated entertainment.

Homepage position: 
10

read more

Read more