
<?phpxml version="1.0" encoding="utf-8"?>
<rss version="2.0" 
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
>
<channel>
<title>Haaze.com / alexalex1981 / All</title>
<link>http://www.haaze.com</link>
<description>Test Web 2.0 Content Management System</description>
<pubDate>Wed, 25 May 2011 07:10:14 +0000</pubDate>
<language>en</language>
<item>
<title><![CDATA[Updated rogue AV installs on Macs without password]]></title>
<link>http://www.haaze.com/story.php?title=updated-rogue-av-installs-on-macs-without-password</link>
<comments>http://www.haaze.com/story.php?title=updated-rogue-av-installs-on-macs-without-password</comments>
<pubDate>Wed, 25 May 2011 07:10:14 +0000</pubDate>
<dc:creator>alexalex1981</dc:creator>
<category>Mobile &amp; Electronics</category>
<guid>http://www.haaze.com/story.php?title=updated-rogue-av-installs-on-macs-without-password</guid>
<description><![CDATA[This screenshot shows the interface of the latest Mac rogue antivirus malware dubbed MacGuard. (Credit:Intego)A new version of rogue antivirus malware that targets the Macintosh operating system does not need victims to type in their administrator passwords to install and infect the machine, a security company said today. The latest version of the malware has been overhauled to look like a nativeMac OS X application and is using the application name MacGuard, according to an Intego blog post. But particularly concerning is the fact that unlike previous versions, which were dubbed Mac Defender, MacProtector, and MacSecurity, MacGuard installs itself without prompting for the admin password.  &quot;IfSafari's 'Open safe files after downloading' option is checked, the package will open Apple's Installer, and the user will see a standard installation screen,&quot; the antimalware company's post says. &quot;If not, users may see the downloaded ZIP archive and double-click it out of curiosity, not remembering what they downloaded, then double-click the installation package. In either case, the Mac OS X Installer will launch.&quot; &quot;Since any user with an administrator's account--the default if there is just one user on a Mac--can install software in the Applications folder, a password is not needed,&quot; Intego says. &quot;This package installs an application--the downloader--named avRunner, which then launches automatically. At the same time, the installation package deletes itself from the user's Mac, so no traces of the original Installer are left behind.&quot; The MacGuard program is downloaded by the avRunner application from an IP address that is hidden using steganography in an image file in the Resources folder of avRunner, the post says.  Web pages that look like a Finder window and appear to be scanning the computer are bogus, Intego said. Users should leave the page, quit the browser, and quit the Installer application immediately if anything has downloaded, as well as delete any associated file from the Downloads folder. Also, users should uncheck the &quot;Open safe files after downloading&quot; option in Safari's General Preferences, Intego advises. In an Apple support article yesterday, the company said &quot;in the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove Mac Defender malware and its known variants. The update will also help protect users by providing an explicit warning if they download this malware.&quot;  The malware keeps changing names and appearances. It is designed to trick people into paying for supposed antimalware software that they don't need.  More information about how it operates is in this FAQ, and information about how to remove it is here and a comprehensive article about how to secure your computer against MacGuard is here. <br/><br/>0 Vote(s) ]]></description>
</item>

<item>
<title><![CDATA[Adobe to fix Flash Player hole this week]]></title>
<link>http://www.haaze.com/story.php?title=adobe-to-fix-flash-player-hole-this-week</link>
<comments>http://www.haaze.com/story.php?title=adobe-to-fix-flash-player-hole-this-week</comments>
<pubDate>Wed, 13 Apr 2011 07:10:20 +0000</pubDate>
<dc:creator>alexalex1981</dc:creator>
<category>Technology</category>
<guid>http://www.haaze.com/story.php?title=adobe-to-fix-flash-player-hole-this-week</guid>
<description><![CDATA[Adobe will release a fix for a new critical bug in Flash Player on Friday for Windows, Macintosh, Linux and Solaris, while Google Chrome users will be protected by Thursday through the browser's auto-update feature, Adobe said today. &quot;As part of our collaboration with Google, Google receives updated builds of Flash Player for integration and testing. Once testing is completed for Google Chrome, the release is pushed via the Chrome auto-update mechanism,&quot; Adobe said in a statement.  &quot;Adobe is testing the fix across all supported configurations of Windows, Macintosh, Linux, Solaris and Android (more than 60 platforms/configurations altogether) to ensure the fix works across all supported configurations,&quot; the statement said. &quot;Typically, this process takes slightly longer and, in this case, is expected to complete on April 15 for Flash Player for Windows, Macintosh, Linux and Solaris.&quot;  Meanwhile, an update for Adobe Acrobat X and earlier for Windows and Macintosh, Adobe Reader X for Macintosh and Adobe Reader 9.4.3 and earlier for Windows and Macintosh will be available no later than the week of April 25, the company said in a security advisory.  Adobe warned on Monday that attackers were exploiting the hole to take control of Windows computers by sending e-mails with malicious Flash files embedded in Microsoft Word attachments. The company said it was not aware of any attacks via PDF (portable document format) files targeting Reader and Acrobat.  Because Adobe Reader X Protected Mode prevents such exploits from executing the company will address the hole in that software in its next quarterly security update for Reader, scheduled for June 14. <br/><br/>0 Vote(s) ]]></description>
</item>

</channel>
</rss>
