Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Screenshots: Sites harbor Windows Trojan

1 of 6 NEXT PREV
  • Hiding places for Windows Trojan

    Hiding places for Windows Trojan

    A flaw in some versions of Microsoft Windows Meta File is spawning attacks ranging from worms to spam, security experts have warned. The Windows Meta File flaw uses images to execute arbitrary code, according to a security advisory issued by the Internet Storm Center.

    Websense Security Labs has posted some examples of sites that appear to have been compromised. This is a Dutch example.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

  • Renovation site hosts Trojan

    Renovation site hosts Trojan

    A vulnerable Windows system could become infected if someone just views what appears to be a malicious image on this compromised Web site, according to Websense's posting.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

  • Sites compromised worldwide

    Sites compromised worldwide

    Websense, which has been tracking malicious activity around the flaw, says it has discovered malicious sites in the United States, Russia, Netherlands, the United Kingdom, China and Japan.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

  • Compromised Cosmo site

    Compromised Cosmo site

    Another example. Mikko Hypponen, chief research officer at F-Secure, estimates that 99 percent of computers worldwide are vulnerable to an attack using the WMF flaw.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

  • Street IT site could pose a risk

    Street IT site could pose a risk

    Microsoft has said it plans to release a fix for the WMF vulnerability as part of its monthly security update cycle on Jan. 10.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

  • Knoppix behavior

    Knoppix behavior

    This is how a machine running Knoppix, a version of Unix, behaves when a malicious Web site is visited using the open-source Firefox browser. It alerts the Web surfer that a file is being opened.

    Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

    Caption by: Bill Detwiler

1 of 6 NEXT PREV
Bill Detwiler

By Bill Detwiler | July 19, 2006 -- 11:48 GMT (04:48 PDT) | Topic: Security

  • Hiding places for Windows Trojan
  • Renovation site hosts Trojan
  • Sites compromised worldwide
  • Compromised Cosmo site
  • Street IT site could pose a risk
  • Knoppix behavior

Simply by visiting these sites using a vulnerable Windows PC could cause an infection, Websense says.

Read More Read Less

Hiding places for Windows Trojan

A flaw in some versions of Microsoft Windows Meta File is spawning attacks ranging from worms to spam, security experts have warned. The Windows Meta File flaw uses images to execute arbitrary code, according to a security advisory issued by the Internet Storm Center.

Websense Security Labs has posted some examples of sites that appear to have been compromised. This is a Dutch example.

Published: July 19, 2006 -- 11:48 GMT (04:48 PDT)

Caption by: Bill Detwiler

1 of 6 NEXT PREV

Related Topics:

Security Enterprise Software Security TV Data Management CXO Data Centers
Bill Detwiler

By Bill Detwiler | July 19, 2006 -- 11:48 GMT (04:48 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums