Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Security

Critical Flaw Found In Virtually All AV Software 279

Securityemo writes "The Register is running an article about a new method to bypass antivirus software, discovered by Matousec. By sending benign code to the antivirus driver hooks, and switching it out for malicious code at the last moment, the antivirus can be completely bypassed. This attack is apparently much more reliable on multi-core systems. Here's the original research paper." El Reg notes that "The technique works even when Windows is running under an account with limited privileges," but "it requires a large amount of code to be loaded onto the targeted machine, making it impractical for shellcode-based attacks or attacks that rely on speed and stealth. It can also be carried out only when an attacker already has the ability to run a binary on the targeted PC."
First Person Shooters (Games)

Left 4 Dead 2 Approved In Australia After Edits 134

Last month we discussed news that Valve's upcoming shooter Left 4 Dead 2 had been denied classification in Australia, which meant the game could not be legally sold there. Now, after a series of edits which removed "considerable amounts of gore from gameplay," Australia's classification board has given the game an MA15+ rating. Their new report (PDF) says, "No wound detail is shown and the implicitly dead bodies and blood splatter disappear as they touch the ground. ... The board notes that the game no longer contains depictions of decapitation, dismemberment, wound detail or piles of dead bodies lying about the environment." The unmodified version of the game may still be approved, pending a review that concludes on October 22nd.
Security

Submission + - Storm botnet spams Youtube exploit (blogspot.com)

cottagetrees writes: Security researcher Roger Thompson at Exploit Prevention Labs posted about a big Storm botnet spam that tells the recipient their face is all over 'net on a YouTube video. The hyperlink to the video looks innocent enough, though the html under the link takes the user to an exploitive IP address that attempts a driveby download of the Q4Rollup exploit, a package of about a dozen encrypted exploits. If the user is unpatched against anything, they're hit. Here's the text of the spam I personally received this morning: "Subject: Who is that your with? lol Date: Sat, 25 Aug 2007 09:40:32 -0400 From: To: OMG, what are you doing man. This video of you is all over the net. here is the link I got http://www.youtube.com/watch?v=pAqQ2G671GV (in the html email, the actual hyperlink is to a different address, which I confirmed was exploitive by pasting it into LinkScanner Online at http://linkscanner.explabs.com/linkscanner/default .asp I test all my suspicious hyperlinks here.)

Slashdot Top Deals

Drilling for oil is boring.

Working...