YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Malware Uses Windows Update as Gateway to Control

Posted On 18 May 2007
By : admin

CYBERSPACE — Apple and Linux users often joke that the Windows operating system is a form of malware. While that may or may not be accurate, one thing that security experts agree on currently is the threat posed to Windows users by at least one crack circulating and capable of hijacking systems during the Windows Update process.Able to bypass firewalls, the program can overpower a key component involved in the Update process, allowing malicious code to download, undetected, onto the host computer.

Security expert Frank Boldewin says the hijacker is particularly nasty because the benign looking email Trojan is capable of exploiting the Background Intelligent Transfer Service (BITS) by piggybacking on it and thus slipping past computer defenses.

In his “proof of concept” paper on the topic, Boldewin explains how he uncovered the menace.

Elia Florio, a Symantec researcher, follows up on Boldewin’s work by stating in her blog that “Using BITS to download malicious files is a clever trick, because it bypasses local firewalls, as the download is performed by Windows itself, and does not require suspicious actions for process injection.”

Although Microsoft admits that it is aware of the issue, its representatives contend that only machines already infected by the Trojan are subject to the BITS vulnerability. “The bypass most commonly occurs after a successful social engineering attempt lures the user into inadvertently running Jowspry, which then utilizes BITS to download additional malware.”

As is traditional, Microsoft recommends that users avoid clicking on links or opening attachments that they are not certain came from a friendly source. Those whose machines may already be infected are encouraged to visit and use the Windows Live OneCare safety scanner.

  • google-share
Previous Story

Bible Obscenity under Fire in Hong Kong

Next Story

Canadian Cop Not Laughing After Gay Porn Prank

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • imaXcash — Dating Affiliate Network
    Dating Affiliate Programs
  • Star Factory PR
    Adult PR Agencies
  • Buddy Profits
    Dating Affiliate Programs
  • Premiere Listing

    TrafficStars

    More Details

RECENT

POPULAR

COMMENTS

XMediaShop Releases Spinner Magazine Issue #3

Posted On 03 Jul 2025

DD White Takes Control in 'The Bachelor Party'

Posted On 03 Jul 2025
Pineapple Support

WannaCollab Joins Pineapple Support As Supporter-Level Sponsor

Posted On 03 Jul 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy