I have just received a message from a friend on Yahoo! Messenger saying

Fiala, originating from China, first appeared in 2008. Over the time, Fiala has ceaselessly changed and improved itself, resulting in the appearance of series of new variants. Fiala has long been capable of propagating via USB or LANs by using ARP poisoning technique to insert Iframe or Script containing dozens of exploit codes for vulnerabilities of different softwares into HTTP responses. Through this infection method, Fiala can spread quickly within a LAN, and sometimes can cause system breakdown.

Today, December 24, 2008, Vietnamese timezone, Bkis’s virus supervisor system detected a new worm – XmasStorm, which originated from China and took advantage of Christmas time to deceive users. It is classified into Storm Worm category concerning it spreading speed and the amount of spam emails that it generates as impetuously as a storm.

The DNS cache poisoning exploit is posing a serious threat of large-scale attack to DNS server systems not only in Vietnam but all over the world. This is a critical vulnerable, especially when hackers have been successful in exploiting it. The problem is that server managers have not had any tools to check if their system is in danger or not, which makes them very puzzled. And one more question, if their systems have the flaw, how could they apply the patch?

CHECKING FOR DNS CACHE POISONING VULNERABILITY (Document for Network Administrators) To check if your DNS servers are affected by DNS Caching Poisoning Vulnerability or not, follow the following three steps:

Showing 141 - 145 of 149 results.
Items per Page 5
of 30

Popup Date Time Portlet

Blogs Aggregator

Recent Posts

Blog Category Portlet


Store Portlet


Vote Baby Portlet