2006.11.28 Daily Security Reading
by Rodney Campbell on Nov.28, 2006, under Security
Introducing Stealth Malware Taxonomy (pdf)
Joanna Rutkowska proposes a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system.
Copyright Office publishes digital exemptions
To hack the security preventing interoperability of wireless phones… to reverse engineer the digital rights management on audio CDs for security testing.
Corporate email is vulnerable to attack from the increasingly sophisticated and ever-growing number of viruses, spam, spyware and phishing technologies out there. And vulnerable to abuse from within, which could result in: acceptable use policies being compromised; regulatory compliance violations; and/or confidential corporate data being leaked externally.
Devastating mobile attack under spotlight
All mobile phones may be open to a simple but devastating attack that enables a third-party to eavesdrop on any phone conversation, receive any and all SMS messages, and download the phone’s address book.
Apple Mac OS X Mach-O Binary Loading Integer Overflow Vulnerability
Apple Mac OS X is prone to a local integer-overflow vulnerability. This issue occurs when the operating system fails to handle specially crafted binaries.