Jump to content
Posted 02 November 2010 - 08:45 AM
Posted 02 November 2010 - 09:28 AM
Posted 03 November 2010 - 11:22 PM
Posted 04 November 2010 - 07:21 AM
Posted 04 November 2010 - 07:27 AM
Posted 04 November 2010 - 08:20 AM
Posted 04 November 2010 - 08:48 AM
Posted 04 November 2010 - 09:06 PM
Posted 04 November 2010 - 09:25 PM
Posted 04 November 2010 - 09:35 PM
Exploit.OSX.Smid.c (OSX/Exploit.Smid.C) are names given by Kaspersky (and ESET) for Java.ByteVerify which is a method to exploit a security vulnerability in the Microsoft Virtual Machine that is stored in the java cache as a java-applet. The vulnerability arises as the ByteCode verifier in the Microsoft VM does not correctly check for the presence of certain malformed code when a java-applet is loaded. Attackers can exploit the vulnerability by creating malicious Java applets and inserting them into web pages that could be hosted on a web site or sent to users as an attachment. Trojan Exploit ByteVerify indicates that a Java applet - a malicious Java archive file (JAR) - was found on your system containing the exploit code.
OSX/Exploit.Smid.C trojan deleted - quarantined
Posted 05 November 2010 - 02:58 AM
Posted 05 November 2010 - 06:24 AM
Posted 06 November 2010 - 10:59 AM
Posted 06 November 2010 - 12:07 PM
• Change all passwords: Anytime you encounter a malware infection on your computer, especially if that computer was used for online banking, has credit card information or other sensitive data on it, all passwords should be changed immediately to include those used for banking, email, eBay, paypal and any online activities which require a username and password. You should consider them to be compromised and change passwords as a precaution in case an attacker was able to steal your information when the computer was infected. If using a router, you need to reset it with a strong logon/password so the malware cannot gain control before connecting again.
Security Advisory (967940): Update for Windows Autorun...Disabling Autorun functionality can help protect customers from attack vectors that involve the execution of arbitrary code by Autorun when inserting a CD-ROM device, USB device, network shares, or other media containing a file system with an Autorun.inf file...
0 members, 0 guests, 0 anonymous users