Computer 'Worms' Turn on Macs 450

Carl Bialik from WSJ writes "Macs have been laregly immune to the viruses, worms and malware that have plagued PCs, but the Mac's recent popularity uptick has meant that 'bad guys appear to be casing the joint,' the Wall Street Journal reports. Among the signs: two recently discovered worms and the discovery of a vulnerability in Mac OS X that leaves Safari open to a hack. A Symantec engineer predicts a 'gradual erosion' of the idea that Macs are a safer operating system than Windows. 'Some security experts believe hackers are becoming more interested in writing nasty code for Macs precisely because of reports of its relative immunity to security woes,' the WSJ reports. 'Apple itself has gone out of its way not to promote the Mac's relative safety, lest it tempt hackers to prove the company wrong. Apple declined to discuss the topic of security in depth for this article.'"

ATI Claims HDCP Then Covers Its Tracks 328

BigControversy writes "It looks like a big can of worms is being opened. The DailyTech.com is reporting that ATI sold millions of video cards knowing that HDCP support was not enabled. Despite that, the cards were sold and advertised to its customers as having HDCP capabilities. A day or two after this information was revealed, HDMI.org went completely password protected and ATI is now modifying key areas of its website, removing any mention of 'HDCP-ready'."

First Mac OS X Virus? 577

bubba451 writes "MacRumors reports on what may be the first virus to affect Mac OS X, disguised as screenshots for the upcoming Mac OS X 10.5 Leopard. From the report: 'The resultant file decompresses into what appears to be a standard JPEG icon in Mac OS X but was actually a compiled Unix executable in disguise. An initial disassembly reveals evidence that the application is a virus or was designed to give that impression.' The virus is said to also spread via Bonjour instant messaging." Update: 02/17 00:09 GMT by P : This is not a virus, it is a simple Trojan Horse: it requires manual user interaction to launch the executable. See Andrew Welch's dissection.

Building Intelligent .NET Applications 213

Scott Forsyth writes "'Building Intelligent .NET Applications' is an excellent primer book into the world of Artificial Intelligence (AI) in the business world, specifically related to Microsoft technologies. It is an introduction to the world of Artificial Intelligence (AI) for .NET programmers. It is the first book I have seen that shows professional .NET developers how to incorporate AI into their daily programming. In this accessible guide, developers learn how to enhance new and existing .NET applications with intelligent agents, data mining, rule-based systems, and speech processing." Read the rest of Scott's review.
Worms

20 Years of Computer Viruses 278

Tuxedo Jack writes "The Register reports that twenty years ago today (19 January 1986), the first computer virus, Brain, was discovered. By modern standards, this was a minor virus, and it spread by floppy disks, which is a far cry from the network-aware worms of today. Still, though, it was the first noted virus, and we've had twenty years of pain and annoyance from it and its successors. Happy birthday, Brain, you and all your little virus friends - just know we're doing our damndest to keep you from having more."
Security

Mac users 'too smug' Over Security? 707

wild_berry writes "Bill Thompson, one of the BBC's technology commentators and presenter of Go Digital on the BBC World Service, expresses his concerns that Mac users assume their safety in the face of trojans, worms, keyloggers and other malware. As a Mac user he is most concerned about the lack of herd immunity that is needed to stop a few infections becoming an epidemic, fully explained in his column week for the BBC technology site. Is he right, and what actual products exist for OS X that would protect against infections?"
Windows

Microsoft vs. Computer Security 439

ArieKremen writes "The Slate has a piece written for the average user attempting to explain why Windows is `still` grappling with security issues. Although Gates made security and privacy top priority four years ago, not much progress has been made." From the article: "Microsoft customers haven't stopped worrying. A year later, Windows was hit with several nasty worms, including Slammer, Sobig, and Blaster. The viruses caused major traffic bottlenecks throughout the world, which cost tens of billions of dollars to clean up. Vulnerabilities deemed 'critical' have forced the company to release an almost unending stream of patches and fixes to the Windows operating system, Microsoft Office, and Internet Explorer." An interesting look at the whole issue.
Science

Tiny Worms Survive Shuttle Crash 46

John H. Doe writes "According to CNet, tiny worms kept in special aluminum canisters aboard the space shuttle Columbia (which broke apart in the atmosphere back in Feb. 1, 2003) survived their fall to earth. The small (about 1mm long) soil roundworm Caenorhabditis elegans was found alive in four or five of the recovered canisters, after an impact 2,295 times the force of Earth's gravity."
Worms

Internet Immunization 229

xav_jones writes "Nature.com reports on computer experts from Israel who are proposing a different strategy for combating fast-spreading worms and viruses -- one in which the fix can, theoretically, keep up with or stay ahead of the malicious code. They 'propose a system in which a few honeypot computers lie in wait for viruses. These computers run automated software that first identifies the virus, and then sends out its signature across the Internet. This enables a sentinel program on all the other computers in the network to identify the virus and bar it before it can attack them.' The honeypot computers would reside in a secure, dedicated network. For 'roughly 200 million computers ... [with] just 800,000 [(0.004%)] of them acting as honeypots [it] would restrict a viral outbreak to 2,000 machines.'"
Microsoft

Just Say No to Microsoft 547

Ben Rothke writes "Load up a computer today with a basic set of applications software, and there will be a de facto Microsoft tax on that computer. Add roughly $100- for the Windows XP operating systems and $350- for Microsoft office, and you have a significant initial financial outlay. If one would use an open source operating system and set of office applications, the cost savings would be enormous. That is why the option of open source is so financially compelling to the both the consumer and organizations have thousands of computers. And open source is corresponding such a threat to companies such as Microsoft. The idea of saving money and never having to worry about a blue screen of death is the proverbial win/win scenario." Read on for Ben's review.
Microsoft

Windows vs. Linux Study Author Replies 501

Last week you submitted questions for Dr. Herb Thompson, author of the latest Microsoft-sponsored Windows vs. Linux study. Here are his answers. Please feel free to ask follow-up questions. Dr. Thompson says he'll respond to as many as he can. He's registered a new Slashdot username, FFE4, specifically to participate in this discussion. All others claiming to be him are imposters. So read, post, ask, and enjoy.
Security

Where are the Prosecutors? 35

a_greer2005 wonders: "In the past 5 years, we have seen plenty of virus writers in the United States brought to justice both criminally and when possible financially. In the past couple of weeks it has been discovered that Sony has shipped a rootkit, which is worse than the common spyware or virus, so I ask you, where are the law suits? Is anyone planning criminal/civil action at all? Does Sony frighten the entire legal industry? If nothing is done about this, will we have ANY right to tell a company 'NO' in the future when it comes to DRM worms -- Is this but a sample of things to come?" Update: 11/12 10:20 PM EDT by C :Whoops! Missed the fact that we've already reported on the fact that California has already started a class action suit against Sony (thanks to the posters that caught this). New York may soon follow. However that is only 2 states out of 50. Is there a possibility of more to follow?
Security

Fully Automated IM Worms on the Way? 230

nanycow writes "The sudden appearance of a rootkit file in a spyware-laden IM worm attack has set off new fears that malicious hackers are sophisticated enough to launch a fully automated worm attack against instant messaging networks. Researchers say the stage is set for a worm writer to use an unpatched buffer overflow in an IM app to unleash a worm that is capable of infecting millions or users without the use of malicious URLs that require a click."
Security

How Do I Determine If My PC is a Zombie? 90

Captain Chad wonders: "With the recent news of a 1.5-million node botnet, as well as the AIM rootkit worm, I'm getting a bit concerned about whether my PC may be a zombie. I'm seeing a lot of internet activity, even when nothing is running, and I've checked the process explorer for obvious tasks to no avail. I apply patches as soon as they're released, and my antivirus/spyware programs report nothing. How do I determine if my PC is a zombie, and if it is, how would I de-infect it?"
Communications

VoIP Backlash From Phone Companies 281

denis-The-menace writes "An article from the online edition of IEEE Spectrum says phone companies in France, Germany, Egypt and Saudi Arabia have announced they will block VoIP calls on their networks. Using new software from Narus Inc., the carriers can detect data packets belonging to VoIP applications and block the calls. Gotta love Ma Bell." From the article: "Narus's software does far more than just frustrate Skype users. It can also diagnose, and react to, denial-of-service attacks and dangerous viruses and worms as they wiggle through a network. It makes possible digital wiretaps, a capability that carriers are required by law to have. However, these positive applications for Narus's software may not be enough to make Internet users warm to its use. 'Protecting its network is a legitimate thing for a carrier to do ... But it's another thing for a Comcast to charge more if I use my own TiVo instead of the personal video recorder they provide, or for Time Warner, which owns CNN, to charge a premium if I want to watch Fox News on my computer.'"
Security

Good Network Worms Made Simple 137

grabbag writes "Dave Aitel is pitching new technology to create "nematodes," or beneficial network worms for use in large businesses. The idea is to set up a new language and structure to create "strictly controlled" good worms on the fly. A research-type demo was given as the Hack in the Box conference where Aitel talked about a world where "strictly controlled" nematodes are used by ISPs, government organizations and large companies to show significant cost savings."
Security

Name That Worm 80

Ant wrote to mention a C|NET article reporting on the Common Malware Enumeration (CME) initiative, now emerging from its test phase. From the article: "Next month, the U.S. Computer Emergency Readiness Team (CERT) plans to officially take the wraps off the effort, meant to reduce the confusion caused by the different names security companies give worms, viruses and other pests. The project assigns a unique identifier to a particular piece of malicious software. When included in security software, in alerts and in virus encyclopedia entries, this identifier should help people determine which pest is hitting their systems and whether they are protected ..."
Security

The Six Dumbest Ideas in Computer Security 792

Frater 219 writes "The IT industry spends a huge amount of money on security -- and yet worms, spyware, and other relatively mindless attacks are still able to create massive havoc. Why? Marcus Ranum suggests that we've all been spending far too much time and effort on provably ineffective security measures. It may come as a surprise that anti-virus software, penetration testing, and user education are three of "The Six Dumbest Ideas in Computer Security"."

Trusted Computing And You 180

sebFlyte writes "There's an interesting look at the Trusted computing initiative running over on ZDNet UK, written by security guru Bruce Schneier. He looks at the suggestions for best practice made in a recent policy document, and Microsoft's 'Machiavellian manoeuvring' to stall said document. He posits their moves are to avoid having to enforce such best-practice when it comes to Vista's DRM and other copy-restriction technology." From the article: "This sounds great, but it's a double-edged sword. The same system that prevents worms and viruses from running on your computer might also stop you from using any legitimate software that your hardware or operating system vendor simply doesn't like. The same system that protects spyware from accessing your data files might also stop you from copying audio and video files. The same system that ensures that all the patches you download are legitimate might also prevent you from, well, doing pretty much anything."
Internet Explorer

Plugin Lets Users Turn IE into Firefox 542

An anonymous reader writes "There is a new plugin available for IE that can make Internet Explorer resemble Firefox by adding tabbed browsing capabilities and an integrated search box. Moreover, the plugin improves IE's privacy and security by integrating a firewall designed to block out Internet exploits, phishing sites, spammers, spyware and worms, with a special HTTP filter that removes private data, and an anti-spyware tool that can identify and remove all pests in less then 10 seconds"

Slashdot Top Deals