Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution – Version: 1.0

Severity Rating: Revision Note: V1.0 (May 14, 2013): Advisory published.Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulner…

Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Severity Rating: Revision Note: V2.0 (May 14, 2013): Advisory updated to reflect publication of security bulletin.Summary: Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS13-038 to address this iss…

Microsoft Security Advisory (2847140): Vulnerability in Internet Explorer Could Allow Remote Code Execution – Version: 2.0

Severity Rating: Revision Note: V2.0 (May 14, 2013): Advisory updated to reflect publication of security bulletin.Summary: Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS13-038 to address this iss…

Microsoft Security Advisory (2846338): Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution – Version: 1.0

Severity Rating: Revision Note: V1.0 (May 14, 2013): Advisory published.Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulner…

Microsoft Security Advisory (2846338): Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution – Version: 1.0

Revision Note: V1.0 (May 14, 2013): Advisory published.
Summary: Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a securi…

Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more…

A Phone Call, a Phish, and a Remote Access Trojan

In April 2013, Symantec was alerted to a series of sophisticated social-engineering attacks targeting a limited set of organizations in Europe. The most distinguishing feature of these attacks is that the victim will receive a phone call from the attac…