Privileged to be one out of 573 round the globe.
http://www.giac.org/certified-professionals/directory/forensics
You can find my profile here:

http://www.giac.org/certified-professional/bhupendra-singh-awasya/123355
nj0y !!!
Again, the Rouge Antivirus Vendors are on rise. This is not just happening this year, actually this is noticed during the begining of year. Check my last year's blog posting "Beaware of Security Essentials 2010, A Rouge Anti-Virus" for the similar Rouge antivirus product.
This time they, "Rouge Antivirus Vendors", came up with "AVG -Antivirus 2011", which is obviously fake. Rouge Antivirus Vendors are impersonating the legitimate AVG antivirus product and replicating the GUI and trademark symbols of AVG antivirus.
Just have a look to the Rouge antivirus "AVG -Antivirus 2011" shortcut icon:
Once installed on system, It blocks other programs running on the computer, hijacks web browsers and displays fake security alerts, threats and risk. This kind of fake security warning may be observed.
It also reports false infections found on your computer and ask to purchase a full version to remove them.
This is the warning page displayed by Rouge AVG-Antivirus 2011, which says, this is trial version having limited functionality and in-order to disinfect your system, you need to purchase the full version of Rouge AVG-Antivirus 2011. And they will lead you to the make some financial transactions.
Please do care about this threat, do not panic and pay. For removal please follow the steps mentioned below:
Countermeasures:
A List of rouge anti-virus /anti-spyware products can be found here.
nj0y !!!
courtesy: SAGI (Researcher)
#@V3 $@F3 8R0W$!n9 . . .
To read more, please follow:
http://bh00ps.blogspot.com/2010/05/beware-of-security-essentials-2010.htmlApologies, for writing after so long,
What brings me to write in here is, the issues seen early this year, two critical vulnerabilities in Microsoft. Almost all flavours of Microsoft operating systems are affected. And the worry is both issues are Zero day and no patch is available from the vendor, off-course some workarounds are there, follow the references.
First issue discovered is in Windows Graphic Rendering Engine (GRE), Issue is caused due to some stack overflow vulnerability in "CreateSizedDIBSECTION()" function in "shimgvw.dll" module. Attackers could exploit this vulnerability by luring users to view a malicious crafted thumbnail image.
Second issue is in Microsoft Internet Explorer 8 (IE8), almost all different flavours of MS has this latest browser. Issue is caused due to use-after-free error in mshtml.dll when processing circular references between JScript objects and Document Object Model (DOM) objects. Attackers can exploit this vulnerability by luring users to visit a crafted webpage or website.
After exploiting any of these vulnerabilities, attackers can take control of affected systems.
For more info, please follow the following links:
http://www.microsoft.com/technet/security/advisory/2490606.mspxGovt. of India took great initiative by facilitating citizens with “National Cyber Crime Reporting Portal” ( https://cybercrime...