Apple’s Immunity, Botnet sanctuary.

Apple Immune?  No way!

But is Apple projecting a false sense of security just to save face? Many experts repeatedly warn that all operating systems are susceptible to viruses, and as the Mac becomes more popular OS X will inevitably become a bigger target for malicious attacks.

[via Pcworld]

Having said that I feel the notion that Apple is trying to keep there reputation as a virus free system. I can only hope that they stay that way. Which as much as I know, Apple will most like start to be the main source for botnets, because of the lack of security.

[ad#ad2-right]According to reports on this blog, people are worried Apple stance on it being the safest and having so much immunity to viruses. Apple in the past has stated they have mislead people with there firewall. Yet Apple takes down that suggestion of having an Anti-virus(Quietly).

[ad#digg-left]Everything I’ve seen suggest that virus writers and Malware writers will MOST likely start targeting the Mac OS X, they know Apple sense of security is Vulnerable to attack and they will exploit it more and more. So what does that mean for Apple, it just means that soon every hacker who has a botnet will want a piece of the Apple Pie and is right now.

[ad#ad2-left]As PC Trojans go, the programming features of RSPlug.E look fairly basic. PC malware is more highly evolved and usually cleverer. But a programmer – probably a Russian – with knowledge of OSX had taken time to create a Trojan that hits Macs instead of PCs, James pointed out.


[via Techworld]

Which looks like it has already begun. So what can Mac users do, get an Anti-virus and maybe Apple will have to start backing down from the Virus commercials and actually admit it. Sooner or later someone will have to challenge Apple to get them to start admitting to it.

Vista has a new Vulnebility!

According to Techworld.com,  Vista has a new Vulnerability that could let a hacker infect a Vista machine with a rootkit.  The talk from them is quite intriguing.   I will quote it to better let you know what the Vulnerability is:

The vulnerability could allow a hacker to install a rootkit, a small piece of malicious software that is very difficult to detect and remove from a computer, Unterleitner said.

[ad#ad2-left]Phion notified Microsoft about the problem on 22 October. Microsoft indicated to Phion that it would issue a patch with Vista’s next service pack. Microsoft released a beta version of Vista’s second service pack to testers last month. Vista’s Service Pack 2 is due for release by June 2009.
[via Techworld.com]

The way they could do this is through the Device IO Control which in turn could corrupt the Kernel of Windows Vista.  Now we all know that Microsoft will release a patch quicker than 6 months away.  According to this article, people are already looking for the exploit and want to know more about it.  I would be willing to bet they will have a patch out sooner than later.  Probably January or Febuary, which will be a big deal because no one will expect it.  I would also imagine hackers will start trying to figure out how they could install software as quick as possible before Microsoft pushes out the patch.   So what can you do to protect yourself, Get a firewall, a Antivirus and learn how to protect yourself to prevent yourself from getting a computer virus.

Fake WordPress update 2.6.4 steals data!

[ad#ad2-left]

The hacked version of the file pluggable appears to be stealing the content of cookies on larger installations of WordPress. Sophos are now detecting this file as Troj/WPHack-A.

[Via Sopho’s]

Apparently this little update is a rogue update.  According to Sopho’s and Craig Murphy’s blog, it is said to steal your data and send it to another site.  This hacked version of WordPress is coming from wordpresz.org so if you happen to stumble onto this fake update, just delete it and go on with your blogging.   Craig talked about how when he logged it this fake update popped up.  So sometimes it is safer to do some digging before you apply an update especially to your Operating system.  Thanks to Sopho’s for telling people about this fake and dangerous problem.

What’s with Google trends?

Having been going to the Google Trends and keeping watching.  I am starting to wonder something?  Take a look at this and you tell me?

Oct 20,2008 Google Trends

[ad]Can you see how someone might use this to create a Goog-411 and use it to promote there website? It is all about the hits and getting what publishers like to say the eyes on a website. Now is that going to confuse people or make people not want to come to a site.  So how would people abuse this?

Very Simple, they’d watch what is trending and post accordingly.  Now you as a reader would click on the website expecting to see what you want to see but instead it would popup with advertisements and maybe malware?  Check these links to better understand it:

[ad]
Now even though these are just a few.  You can see how someone might want to abuse it and get there site up on Google trends and be able to infect several to even millions of computers before Google sees that or stops.  You could in theory take over a website high in Google rankings and do exactly that.

Then I have to ask myself, why would hackers want to do it in the first? One they’d be able to direct people to sites that they could use to phish your information, or maybe make money by you going to these sites. It is all about money, I don’t say that lightly, but it seems to always be true.

So what is Google doing to prevent this? is it right to use Google for your advantage? Do we need it for anything other than to see what people are looking at? Is that a form of them tracking your every click.

[ad]
Are you comfortable with them keeping the list of what people searched for last year? if you don’t believe me, go check it out yourself. These are important questions to answer and should be explored.

The Xbox 360 Elite laptop: Ben Heck strikes again

We think it’s possible that the time has come to admit that Ben Heck (aka Benjamin Heckendorn) has officially taken it to the limit, put the pedal to the metal, and a large number of other cliches that suggest something has been pushed just about as far as you can take it. That’s right folks — it’s the Xbox 360 Elite laptop. We’re not even going to try and pretend to understand how an individual could go about creating this kind of extreme mod to the Microsoft console — needless to say that if there was one man who could do it, Ben is that guy. Luckily for us lay-people, he’s included a graphic breakdown of just about every step on the road to a portable Xbox 360, replete will all the case cracking, innards opening, wire splaying photos you could possibly want or need. Sorry NEStari and Atari 800 laptop — there’s a new boss in town.
[Via Engadget]

Wouldn’t you love one of those! It looks so cool!!! Thought people would like to see this for themselves!!