* Patches from Gentoo, Fedora, Debian, others * Beware worm that targets the .Net framework and can infect both regular desktops and Windows Mobile devices * VeriSign warns of massive denial-of-service attacks, and other interesting reading Today’s bug patches and security alerts:Adobe warns of critical flaw in Flash playerA flaw in many versions of the popular Flash player could allow an attacker to run arbitrary code on the affected machine if a malicious SWF file is loaded. Users should upgrade to Version 8.022.0 to fix the problems.Related US-CERT advisory **********Symantec warns of DoS in Veritas Backup Exec An internal review of code by Symantec turned up a potential denial of service vulnerability in multiple versions of its Veritas Backup Exec software. Updates are available.**********New patches from Debiankpdf (buffer overflow)Drupal (multiple flaws)wzdftpd (code execution) xine-lib (buffer overflow, code execution)vlc (buffer overflow, code execution)xpvm (non-secure temp files)********** Recent updates from Fedora:kdelibs (multiple flaws)xpdf (multiple flaws)libungif (code execution)gdk-pixbuf (multiple flaws)kernel packages (multiple flaws)**********New updates from GentooMetamail (buffer overflow, code execution)Crypt::CBC (weak encryption)Heimdal (privilege escalation)PEAR-Auth (authentication bypass)zoo (buffer overflow, code execution)Freeciv (denial of service)**********Today’s roundup of virus alerts:Troj/PWS-KI — This Backdoor Trojan e-mails its author when it infects the machine and can communicate with outside hosts via HTTP. It is installed as “Server.exe” in the Startup directory. (Sophos)W32/Xrove-A or CXOver.A — A worm that targets the .Net framework and can infect both regular desktops and Windows Mobile devices, spreading to any mobile device connected to an infected PC. It tries to delete files in the “My Documents” directory. (Sophos, Panda Software)Troj/Bancban-OJ — Another Trojan that is used to steal local information – usually related to Internet banking sites – and can be used to download additional malicious code. It is installed as “taskmam.exe” in the Window System folder. (Sophos)Troj/ServU-CE — A hacked version of a commercially available FTP server. It runs the server on port 43958. (Sophos)Banker.CHG — A Trojan that is manually spread to a machine. It targets specific Internet banking sites. When one of the target sites is hit, the browser is redirected to a similar looking phishing site. (Panda Software)W32/Tilebot-DX and EA — A backdoor Trojan that spreads through network shares with weak passwords and known Windows vulnerabilities. It allows access through IRC and installs the file “win32ssr.exe” in the Windows System folder. (Sophos)Troj/Jubik-A — A Trojan that tries to download and install additional malicious code on the infected host. It is installed in the Windows System folder as “jb???.exe” (the ?s are random characters). (Sophos)Troj/Steam-F — This Trojan steals passwords for the game Half Life 2. It is installed as “xy337.bat” in the Windows Temp folder. (Sophos)**********From the interesting reading department:VeriSign warns of massive denial-of-service attacksA sudden increase in a particularly dangerous type of distributed denial-of-service (DDoS) attack could portend big trouble for companies, according to VeriSign. Computerworld, 03/16/06.Microsoft goes public with Blue Hat hacker conferenceMicrosoft is going public with some of the hacking information discussed at its Blue Hat Security Briefings event. On Thursday, just days after the end of its third Blue Hat conference, the software vendor posted the first blog entries at a new Web site. Microsoft is also promising to publish more details on the secretive invitation-only event. IDG News Service, 03/17/06.Use numbers to fight cybercrime, PartnerWorld attendees are toldStatistics could prove a handy ally in helping companies large and small to ward off cyberattacks, according to one security expert. IDG News Service, 03/16/06. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe