2010年8月14日星期六

The first pictures appeared online computer virus

Anti-virus has been intercepted portal also announced the first use of Microsoft's latest security vulnerabilities picture virus, and to remind the user attention to anti-virus software updates and patches to the system in time.

"Although so far this picture are not many examples of viral infection, but this has proven advantage of the vulnerability of the virus has emerged and variants may occur at any time." Kingsoft Anti-virus experts, the company told reporters, because "Tupian virus"
Of transmission anomaly widely, users browse the Internet pictures, open infected e-mail pictures and even during the browsing user avatar instant messaging software will be the course of infection.

Kingsoft Anti-virus from the center of the monitoring data show that the first picture so far the virus called "Wxploit.win32.MS04-028. Gen", is a Trojan horse of viruses, if the user does not have time to play computer good patch, it is possible to connect when browsing the specified FTP address growers Trojans and Trojan file from the FTP download and run the Trojan files in order to achieve the purpose of remote monitoring and control infected machines.

Electronic image hidden virus

When you surf the Internet beautiful, scenic, and other electronic picture, there is not expecting a vicious computer virus infection. Recently, Kingsoft Anti-virus Centre reminded the new Microsoft vulnerabilities present Jingxian  "JPEG processing buffer overflow" vulnerability GDI +, the user will be able to browse the Internet e-picture exposure!

Electronic images may be in three forms of virus attack: mass e-mail with virus attachments entice users to click on the picture; by a malicious Web page form, users browse the web in the electronic image files, and even comes with a picture page can be virus infection; through instant messaging software (such as MSN, QQ, etc.) own image, or send picture files to spread. Kingsoft Anti-virus experts Guojun description, picture virus against allowing users to view electronic images of a system crash when the phenomenon, while making their own machines to run other virus code, resulting in Trojans, worms personal computer trespass.

Kingsoft Anti-virus experts believe that this year features a new computer virus changes, the electronic image viruses, Trojan horses are the 11 National Day to watch for. Trojan virus together with the worm, by e-mail, browse the Web, operating system vulnerabilities to infiltrate the various user computer, the electronic picture virus just to lure users to click on pictures can be infected.

11 holiday has to  Duba makes six safety recommendations  an anti-virus outbreak  please e-picture win for all users of various patches  two anti-Trojan, steal account the need for timely installation of three anti-hacker firewall  virus infected web sites Do not name through the control network run  four anti-trap does not fill out credit card numbers  free e-mail greeting cards with five anti-virus e-mail do not open  six strangers QQ tail and other anti-virus  Do not click on links or run the other came program 

Kingsoft Anti-virus center predicted the use of an electronic image of this vulnerability in the virus will soon occur, users should patch immediately. Duba current characteristics according to the vulnerability of the virus database upgrades, can exploit this vulnerability to conduct anti-death spread of electronic picture virus, and will be announced today for this vulnerability scanning tool, For more information about this vulnerability, please visit db.kingsoft.com Information Security Web site.

Additional Explanation:

GDI + vulnerability and the vulnerability of the difference between past, before several major flaws affected only the operating system, but GDI + is the application that are affected, to the user, and can not determine which program uses GDI +, if there are loopholes. According to this feature, Jinshan announced emergency JPEG image vulnerability scanning tool (Download: db.kingsoft.com), on the one hand help computer users to check all the attacks that exploit the flaws in the picture, to help users killing JPEG picture virus, another , it can help you check all the loopholes in computer applications.

Work after the holiday and the JPEG virus beware of love you virus

After the holiday, the first thing a family office is to your computer to a major cleaning. As the long time use of computers and networks, e-mail and other information will certainly be filled with mail, e-mail business in dealing with the same time, Duba anti-virus experts have warned that users must pay attention to the message hidden in the virus, such as 11 during the transmission The "Love You" worm, such as a trap, there is trouble in the uproar of the "picture virus" that is likely to cause serious damage in the 11 after the holiday. Experts believe that the first major office postganglionic family is killing the virus, prevent economic losses.

Reminder that we should focus on prevention of type II virus, the first category is the virus spread through e-mail, such as 11 after called "pull mill rat" of the virus to spread through OutLook, "La mill rat "is a hacker using email communication tools, hackers can control the user through the system of the virus, the user system to upload, download, Execute and Delete and other file operations, or is Guanbi system, which seriously affected the normal use of the user on the system .

The second category should be wary of is the "picture virus", it is possible here, while various electronic images will be infected with viruses! Beautiful women, dogs and cats and other animals, or friends may be in possession of photographs have a vicious virus. If the user clicks on this picture that is likely to be infected such as: machine crashes, system slowdowns, or personal information leakage occurs, computer users need less beautiful picture better.

Kingsoft Anti-virus experts recommend that users do anti-virus preparation, there are two kinds of measures to protect computers from viruses. Users must immediately start full virus scan, the machine hard disk to scan every file again. There is the users should delete the spam, best not to open e-mail from strangers, to prevent worms, viruses and other pictures by e-mail cause havoc.

At present, the use of computer office workers is the primary attention of computer virus damage, pictures, viruses, Trojans, worms will be by e-mail, visit the beautiful photographs, and other modes, high-fat phase of the virus in the near future, the user should try to avoid the virus can cause harm operations, such as small electronic image browsing.

db.kingsoft.com anti-virus authoritative website for more information on the latest viruses, users can visit to learn more postganglionic anti-virus situation.

"MSN crook" wild virus transmission

Sina Technology News October 10, Rising global anti-virus monitoring network first intercepted a spam advertising messages using MSN virus, named "MSN liar (Worm.msn.funny)". October 10, many MSN Messenger users to Rising customer service center for assistance that reflect their own receive such a message: "The Japanese massacre in Nanjing irrefutable evidence! Firmly boycott! Www .** 78P.com", followed by income to a "FUNNY.EXE" file, your document will run the online friends sent to all the above information.

Rising global monitoring network based anti-virus monitoring, the spread and infection of the virus very quickly, MSN users in the spread and even with the "shock" and "Sasser" virus quite. Rising anti-virus head Jun Cai explained that the virus seems to be a site Daquan Lei Wang Zhan promote their tactics, in addition to MSN friends Fasong random virus Xinxi the salient features of this addition, the virus on the user system is the other destructive analysis.

Rising company has reported the incident the public security department, under the law, creating and spreading computer viruses will bear legal responsibility.

For this vicious virus, Rising will be in the October 10 emergency upgrade, RISING Antivirus 16.47.30 Edition can completely killing the virus. In addition, users can always call the Rising Anti-Virus Emergency Tel :010-82678800 to ask for help.

Hackers attack using pornography

Sina Technology News several anti-virus companies and Internet security organizations has issued safety warnings, malicious hackers have begun to spread Presence network news group "JPEG loopholes" in the pornographic images, this is the first time reports that hackers began Use "JPEG loophole" attacks on the public. "JPEG vulnerability" Microsoft United States for 9 published on 14 of a security vulnerability, there is the problem if a user downloaded a JPEG image, it could lead to computer Shangpianzhuang Yuan Cheng control software, Conger malicious hacker also Huode of Mubiaozhuji remote control.

Hackers will be there "JPEG vulnerability" of pornographic images posted on various Internet news groups, mainly because usually a lot of network users through network news group to share pornographic images. According to network security forum Bugtraq and Easynews.com published information, hackers in Beijing on September 28 in the news group posted a similar "alt.binaries.erotica.breasts" pictures, some of which hackers use e-mail address is Power -Poster @ power-post.org.

ISC (Internet Storm Center), chief technology officer Jonas - Ullrich (Johannes Ullrich) said that difficult problems of image information in the group with a distinction between the normal picture, but these pictures have included the use of "JPEG loopholes "in the code. Hackers use "JPEG vulnerability" approach was just released last weekend's "JPEG of Death", but on a small range of revision. The same way as with the other use, "JPEG of Death" is also a JPEG file format through the GDI + JPEG decoder cause a buffer overflow. GDI + JPEG decoder is a common Windows component, is widely used Windows operating system, IE browser, Outlook and other Windows software.

When the user opens a JPEG image, the existence of the problem, the computer system will automatically install the remote control program Radmin, a hacker can the process as "Trojan horse" to Huode right of the target host remote control Right. In addition, the infected "Trojan horse" of the host will automatically send the report to the IRC channel. Ulrich said that this attack method works only on computers using the Windows XP operating system effective.

ISC and antivirus companies to remind customers, from a technical perspective, there is "JPEG" image holes, and will not spread like a virus, but the hacker can use to modify the code so that it automatically downloaded with the ability to send e-mail virus engine, thus speeding up the spread. Security experts fear that the existence of the GDI + JPEG flaw as "Sasser" virus spread as leading to the Internet again. Because through "JPEG" vulnerability could gain unauthorized access to the target host on the IE browser, Outlook e-mail program and the Office and other applications, it is very attractive to malicious hackers.