Posted by Brian Krebs on Computer Security 184.108.40.206 February 20, 2009 at 16:21:08:
Re: закрыли доступ в однокассники, вконтакте на работе, кто знает ссылки? posted by Правлин 220.127.116.11 February 20, 2009 at 11:28:52:
Original text: я например пользуюсь http://www.dostupest.ru/ специально заточеный сервис для доступа в однокласники и вконтакте. Ну и новые адреса там появляются регулярно, помогает против ..
Hackers are exploiting an unpatched security hole in current versions of Adobe Reader and Acrobat to install malicious software when users open a booby-trapped PDF file, security experts warn.
Adobe issued an advisory http://www.adobe.com/.. Thursday warning that its Reader and Acrobat software versions 9 and earlier contain a vulnerability that could allow attackers to take complete control over a system if the user were to open a poisoned PDF file. Adobe said it doesn't plan to issue an update to plug the security hole until March 11.
Meanwhile, the folks at http://www.Shadowserver.org/ , a volunteer-led security group, said it has seen indications that this vulnerability is being used in targeted attacks http://www.shadowserver.org/.. . Shadowserver warns that this exploit is likely to be bundled into attack kits that are sold to cyber crooks who specialize in seeding hacked and malicious Web sites with code that tries to install malware.
"These types of attacks are frequently the most damaging and it is only a matter of time before this exploit ends up in every exploit pack on the Internet," Shadowserver volunteer Steven Adair wrote on the group's blog.
In the past I have recommended the free version of Foxit Reader as a faster and more lightweight alternative for viewing PDF files. However, I have not yet been able to verify whether Foxit Reader may be similarly vulnerable. I will update this post if I receive an answer from Foxit.
Update, 10:34 a.m. ET: "Sherry" from Foxit wrote me back to say the company has no information to suggest Foxit is similarly vulnerable: "Currently Foxit Software have not suffered these problems. And we will pay attention to it in the future."
Also, Symantec has now posted its writeup http://www.symantec.com/.. on this flaw, saying it has received reports of targeted attacks against government, large enterprise and financial services organizations. "We have observed few exploits of this vulnerability in the U.S., China, Japan, Taiwan and the U.K. and continue to monitor for any signs of a widespread attack using this exploit."