Welcome to PChuck's Network News.

Saturday, December 02, 2006

Captchas and Online Games

This is a pretty long video (50 some minutes), but it's worth the time to watch. It discusses these issues, and more.

  • What is a Captcha, and why is it not the ultimate protection against automated attacks?
  • Why do I see a Captcha sometimes, when I'm looking at pictures?
  • Why are there so many free online games?
  • How does Google Images get their pictures labeled so accurately?
  • How do hackers and spammers setup multiple online accounts, using scripts, even with Captchas required by the online accounts?


Captchas and Online Games: Human Computation (Luis Von Ahn: July 26, 2006)

>> Top

Thursday, November 09, 2006

MySpace? Stay Away!

MySpace, as all active Internet services, is creating new possibilities for its members to "smarten up" their space, in this case, their home pages. In their attention to detail (or lack of attention), MySpace appears to make it possible for someone to create a home page that overwrites the portion of the screen whereon sits the account name and password, where you login.

Here is a very nice phishing opportunity. And the phishers didn't pass it up.

When you login, you innocently enter your account name (user name) and password. It's picked up by the phisher script, and added to their database. You login again, see your home page, and never realise that your details are now in the hands of the bad guys. Somewhere around 35,000 phishes, and you're one.

As reported in DSLR Forums Huge myspace phishing scam

MySpace is unable to recognize the risks when a new user creates their page to host a copy of the myspace login box that steal passwords.

We have verified that the simple scam has netted over 700,000 myspace login email addresses and passwords so far, and the data is still being collected as these trojan myspace pages are still scattered all over the site.


Note that 700,000 myspace login email addresses and passwords apparently resulted from a mere 35,000 individuals, each MySpace phish victim being fooled an average of 20 times each.

The average MySpace member is 13 and probably lacking in capital. The possibility of similar services, eBay and PayPal for instance, with duplicated account names and passwords, is probably going to keep the phishers happy for a while, though.

If you've used your MySpace account recently, you need to change your password there, and on any other accounts or services (eBay and Paypal, to start) where you're using similar account names and passwords. When you change your password, make it complex - not something simple like "password1".

If you've used your MySpace account recently, don't count on MySpace sending you a vulnerability warning. Get this done now.

>> Top

Tuesday, October 31, 2006

Another Reason To Avoid ICS

I've told you so many times that using your computer to share your Internet service - using ICS - is not a good idea. My reasons center around the needless complexity, and load, placed upon the server.

Now we have a new reason to avoid ICS. This week, ICS is being used as an attack vector. NetworkWorld: New Windows attack can kill firewall points out

The code, which was posted on the Internet early Sunday morning, could be used to disable the Windows Firewall on a fully patched Windows XP PC that was running Windows' Internet Connection Service (ICS).


So, if you're running ICS because you have 2 computers, and you think that Windows Firewall protects you, think again. Even if your computer is fully patched, if you have ICS behind WF, you are at risk.

Perimeter protection, aka a NAT router, is the only real protection.

>> Top

Thursday, October 26, 2006

And Now Fake Codecs

So an EBud just sent you an E-Card greeting, supposed to be soo cute. And you play it, and you get a notice

Your player needs an extra codec. Shall we find it for you?

STOP! Right now, it's time to close the browser, flush your cache, and restart the computer.

Sometimes, you may see the above advice when surfing to various web sites that provide free movies (and no, we won't discuss what type of movies, though this problem is more common on certain types). It's the same thing though. The content (E-Card, online movies, whatever) is the attraction. The trojans are the payload. It's all just another way of hacking your computer.

Lavasoft News Beware - Desktop Hijacks on the Rise Again says
Watch out for the Zlob Trojan that poses as a codec needed to view a video, then installs a fake virus and urges its victims to download a rogue anti-spyware program to remove it.


And again we see the repeated advice
...even a spoofed e-mail that claims to be Windows Update (Microsoft never sends updates via e-mail)

as if I haven't harangued you about that before.

The best prevention is avoidance. Stay safe.

Wednesday, October 18, 2006

Email Offering IE7? PASS!

Did you recently get email from "support@microsoft.com"? How many times have I pointed out that

Microsoft does not email software offers or updates.


Today, The Register: Trojan download site spoofs IE7 release outlet points out that

Hackers have created a bogus Internet Explorer 7 download site that attempts to load Trojan code onto the PCs of visiting surfers.

Traffic to the malicious website is being driven by a spoofed email message, claiming to be from support@microsoft.com, offering a link to download Release Candidate 1 (RC1) of Microsoft Internet Explorer 7.

Once again, here's a clue.
Microsoft does not email software offers or updates.

And, if you ignore the warning, yet another chance to become part of a growing trend: botnet membership, a club that you do not need to join.

Would You Like Fries With Your Virus?

A couple years ago, music giant Sony got caught loading their customers with hidden software, when they were stupid enough to load "extra content" from legally purchased CDs onto their computers.

Today, we hear of Apple, who shipped a small quantity of iPods infected with a virus.

As you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it.


And earlier this week, we hear that MacDonalds in Japan gave out MP3 player infected with yet another virus.
We haven't seen these players ourselves, so we can't confirm how exactly you would get hit by this trojan, but some sources report you only had to plug it into your Windows PC.


Once again, practice Layered Security on all computers. Please. Botnets are more and more useful, so don't contribute to the population.

Wednesday, October 04, 2006

The Good Guys Win One

From Nigeria, actual tape of a cybercafe raid, with a band of 419 scammers arrested.

Interestingly, those not directly involved in the scamming still profit. Neighbours outside the cafe didn't react well to the arrests being made.

Thursday, August 31, 2006

A New Security Risk: Your Old Cell Phone

In Dufus Or Joe Job Victim?, we looked at an idiot who sold a laptop computer, and came to regret it. Amir probably deserved what came to him, but it doesn't mean that we shouldn't learn from his mistake.

So how about your cell phone? You may be surprised to learn that it's a small computer. It may have an amazing storage capacity, and what's stored there can cause you embarassment, if you give away, lose, or sell the phone. Apparently, what's stored on your cell phone can be resurrected, even if erased - just as the contents of your computers hard drive can be recovered.

CNN Technology: Cell phones won't keep your secrets discusses experiences where

Curious software experts resurrected information on 10 used phones (purchased on eBay), including the racy exchanges between guarded lovers, and
  • One company's plans to win a multimillion-dollar federal transportation contract.
  • E-mails about another firm's $50,000 payment for a software license.
  • Bank accounts and passwords.
  • Details of prescriptions and receipts for one worker's utility payments.
The recovered information was equal to 27,000 pages -- a stack of printouts 8 feet high.

"Most people toss their phones after they're done; a lot of them give their old phones to family members or friends," said Miro Kazakoff, a researcher at Compete Inc. of Boston who follows mobile phone sales and trends.

Think next time, before you give your old phone away.

Saturday, August 26, 2006

One Small Bit Of Good News

21 year old Christopher Maxwell was sentenced to 37 months in federal prison on Friday for hacking, that in the estimate of the Seattle FBI's cybersquad, netted Maxwell and two unnamed teenage accomplices "more than $100,000".

Maxwell, holding back tears, pleaded for probation in lieu of prison time.

I am a 21-year-old boy with a good heart and I made a mistake. I never realized how dangerous a computer could be. I thank God no one was hurt.


The judge was not taken by the tears, or the plea. While Pechman took Maxwell's age and lack of criminal record into account, she said the prison term was necessary to provide a deterrent to other hackers.

Victims of the hack included
  • Colton Unified School District in California.
  • Northwest Hospital in Seattle.
  • The US Defense Department.

and doubtless thousands of unknown private computers that will never be identified.

He got off lightly, but it's a start. Hopefully the FBI is getting better at this now.

Monday, August 21, 2006

Pizza Order Credit Card Scam

OK, tonite you want a pizza for dinner. So you call your local pizza restaurant, and have one delivered.

But there's a problem. They don't accept cash payments anymore - it's pay by credit card only.

Right now is when you should smell a rat. But you're hungry, and you want to smell pizza. So you give them the number, they take your order, and you hang up.

Your pizza never comes, and your credit card is now being used in a major shopping spree by the guy who just took your order. And he's not a pizza call center employee.

The bad guys convinced AT&T to route calls, intended for the pizza shop, to their phone number.

Hello, Big Cheese Pizza. How can I rip you off today?

The police know about this in Southern California, but it's possible that it's going on elsewhere. You don't really know.

What's the story here? >>> AT&T Service Reps must be really gullible.

Sunday, August 13, 2006

August 2006 Patch Tuesday Report

Last week, Microsoft issued 12 security patches, 9 which they rated as Critical (Patch ASAP), and 3 Important (Patch As Soon As Convenient). ISC / SANS rated those patches, for computers used as network clients, as 2 Extra Critical (PATCH NOW), 8 Critical, and 2 Important.

One of those patches, MS06-040 (KB921883), fixes a vulnerability in the Server service (remember that almost all Windows computers will run the Server service, even though they may not be dedicated servers).

Today, ISC SANS issued MS06-040: BOLO -- Be On the LookOut (NEW), stating that

Over the weekend there was a botnet doing fairly wide scale scanning for hosts affected by the vulnerabilities in the MS06-040 advisory. While technically a botnet, it was spreading in a worm like fashion.

MS06-040 is one of the two patches that were rated as PATCH NOW by ISC SANS. Among the advice given:
  • If you have not done so yet:
    • Roll out the MS06-040 patches ASAP.
    • Do not forget to reboot those machines after patching!

MS06-040 has passed from vulnerability, to Proof Of Concept exploit, and to active exploit in progress. This is a serious situation, as documented by US CERT. Patch Now, please.

For convenient immediate downloads, I offer direct links here. Or you can use Windows Update, or Automatic Update.
  • Take a system checkpoint first.
  • Verify your Operating System name and service pack level:
    • My Computer
    • Properties
  • Download the most urgent patches, properly chosen for your operating system and service pack level, to an organised folder on your disk.
  • Run each update, from the folder, using Windows Explorer.


Ongoing Stories.

Monday, August 07, 2006

Bots And You

For those of you who are maybe living in a cave (and if so, what ISP services you?), of the millions of computers in the world, a good portion of them are not controlled completely by the person who is paying for their Internet service. These computers, hijacked by a successful hacking campaign, and controlled by another person, we call bots. One bot is useless; bots are maintained in collections, called botnets. A botnet could range in size from 10,000 to 1.5 million hijacked computers.

I've been observing, and writing about, botnets for some time.


Most people don't realise that botnets are both the attack vehicle, and the payload of a successful attack.

Sunday, August 06, 2006

Bump Keys - A Growing Security Problem

Securing your computers, and your network, begins with physical security. This is one reason why WiFi Security is so important, and so problematic.

But, if you're depending upon a cylinder lock on your front door, to restrict physical access to your network, you need to be aware of the newest threat - Bump Keys.

This looks real scary. But is it real? One would hope not.

Well, in typical You Tube fashion, when you watch that video, you will have a choice of several others like it in the You Tube library. Watch the others too. One video - maybe somebody's imagination. Two videos - maybe a game by some college studants. Five videos, a DSLR Forums thread, and an MSNBC article - a very real problem.

Tuesday, July 11, 2006

Stolen Computers And You

There are probably millions of computers, all over the world, being used or controlled by someone who is not legally entitled to do so. We've discussed botnets before. Once used mainly for spam delivery, they are now being used for hijacking Blogger blogs.

Since blogs and instant messaging, together, is replacing email for those tired of spam, the spammers have turned to spam blogs, or splogs. And botnets are being used to hijack legitimate blogs, with value to search engines, and make them part of splog nets.

Right now, this activity is, I believe, limited to attacks against Blogger blogs. It doesn't take too much imagination, though, to see the same techniques being used against online communities like MySpace and Yahoo 360.

Friday, June 16, 2006

PirateBay Strikes Back

PirateBay, one of the larger BitTorrent trackers, and based in Sweden, was recently under attack by the MPAA / RIAA. PirateBay is trying to keep the RIAA / MPAA from strangling the future of recorded music.

Well, PirateBay is back.

Patch Tuesday Was This Week

And already trouble calls are coming in.

If your computer connects by dialup to the Internet, you may find problems, after applying Critical Patch MS06-025 (KB911280).

Microsoft currently is requesting individual problem reports, from anybody experiencing problems with dialup service, after appling the patch. ISC / SANS Potential Patch Problem with MS06-025 reports:

They want each customer to open their own case. You need to mention MS06-025 breaking dial up and your case will be created and then added to the master case. The number to use to contact Microsoft for free support, for issues such as these, remains the same: 1-(866) PC-SAFETY.

Thursday, June 08, 2006

R.I.P., Windows 98, 98SE, ME, and XP SP1

Windows 98, 98SE, and ME have reached the end of their support lifecycles.


Support for Windows 98, Windows 98 Second Edition, and Windows
Millennium Edition (Me) ends on July 11, 2006, which is the July 2006
Monthly Bulletin Release date. This means Microsoft will end public and
technical support on July 11, 2006. This also includes security updates.


Also, an anticipated update to Windows Explorer won't be provided, either. See the FAQ.

After extensive investigation, we’ve found that it’s not
feasible to make the extensive changes necessary to Windows Explorer on
these older versions of Windows to eliminate the vulnerability.


Windows XP SP1 will be soon reaching the end of its support lifecycle, too. Update, before it's too late.

Wednesday, June 07, 2006

Sharing The Pain

Last year, Microsoft produced a very popular video called We Share Your Pain, where they describe a Microsoft Quality Assurance program where their employees are properly motivated to not cause problems by writing problem code.

The program (regrettably mythical) includes a rather special desk chair used by Microsoft employees. The chair would punish the employee, who writes the defective code, in several possible ways. One way, demonstrated by the engineer of the chair, would involve


2 needles, released from the bottom of the chair, into the fleshly part of the buttocks

unorthodox, but effective - it's more people related


This month, we learn that even Steve Ballmer felt the pain once. He tried to cleanup an infected computer, unsuccessfully. Even a crack team of Microsoft engineers could not clean up this computer.

According to the teller of the tale, Jim Allchin, the brilliant mind behind Windows Vista and Windows XP,

Ballmer eventually gave up and instead lugged the machine back to Microsoft's Redmond, Wash. campus. There, several engineers spent several days, burrowing deep into the system to figure out the problem. Imagine, CSI: Redmond.

It turns out there were more than a hundred pieces of malware of various types. Things that these engineers using Microsoft's own private tools could not ferret out and fix.

There are many points to this tale. Most will say that it merely indicates that malware is out of control. Those folks would be wrong.

The point here is that, if you depend upon periodically cleaning up your computer, you are wasting your time. Eventually, cleaning up your computer won't work. Some malware is written to protect itself from being removed.

The best way to not share the pain, or ever feel the pain, is to protect your computer. Keep malware off your computer, and your network. Layer Your Security. That's the answer.

Tuesday, June 06, 2006

Happy Devil's Day

Today is 6/6/6, and we have a new devil noted.

Taking a cue from some earlier bad guys, the virus of the week, GpCode.af, will encrypt the contents of your hard drive, then leave you a message directing who to contact. Upon sending email to the instructed address, you will supposedly be provided with payment instructions.

This threat appears rather alarming.

  • One expert, Harry Waldron, notes that
    ...at the moment, we're still not 100% sure how this virus penetrates victim computers.
  • This devil is using a very high level encryption - One version uses RSA 330 bit. To bring this to an understandable reference, for those of you who have seen the WEP cracking video - I don't think you'll be recovering your computer, if infected by GPCode, quite as quickly as the demo shows a WEP AP being cracked.
  • F-Secure Virus Descriptions : Gpcode calls this
    ...a type of criminal activity that has not been seen for a long time.


Kaspersky Labs has very specific instructions for you, should you find yourself infected.

Kaspersky Lab strongly recommends that anyone who has had files encrypted should contact the Virus Lab. Under no circumstances should users give in to blackmail, as this will encourage the authors of this program to create new versions.

We certainly don't want this behaviour to spread. What if the bad guys discover that it's simpler to simply scramble your data, then ask for money? What do you do when the "password" that they deliver to you, in response to your "payment", doesn't work? Do you think you'll get your money back?

Interesting spam out too. SANS Diary Spam - spam - spam reports
Some of our readers report receiving messages apearing to originate from themselves, with only numbers as subject and body.

The number in the body, according to several DSL Reports members, appears to be
969

SANS Diary Spam - spam - spam further notes that

Some guesses as to what the cause of the spam might be have been received by now and I'd like to point out a few:

  • Today's date is the number of the beast, it might attract some old style hackers.
  • There is a possible link to Bagle seeding as it was done in the past and we might need to expect a new variant of it soon.


It's now 18:00 here in California. Most parts of the world are already into 6/7. Devils Day is almost over.

I don't think it's effects will end very soon though.

Friday, June 02, 2006

Firefox V1.5.0.4

Firefox V1.5.0.4 is out - it resolves several known security issues, and is marked Critical.

As I noted with V1.5.0.3, it is now downloading automatically. If you have Firefox installed, it may have already updated. If not, you may wish to do this at your convenience, or let the automatic update feature perform the update for you. It's your choice.

If you don't have Firefox yet, why not?

Monday, May 29, 2006

Dufus or Joe Job Victim? Your Call



Amir sold a laptop, used, on E-Bay. Mistake 1.

Amir didn't think to wipe the drive on the laptop. There were lots of interesting pictures, and more, on the drive. Mistake 2. Big mistake.





Oh yeah, the laptop didn't work, and it lacked features as advertised. Mistakes 3 and 4.

Amir took 2 months to send the laptop to the purchaser, and ignored repeated refund requests from the purchaser. Mistakes 5 and 6.


The guy who purchased it knew how to remove the hard drive and extract the contents. And he knew how to create a blog. Now that blog, The Broken Laptop I Sold On Ebay, and subsequent blog Amir Massoud Tofangsazan: The Blog Continues is Amir's problem. (Note 8/17): The latter selection has more relevant content; the former appears to have mutated into a splog.

Always, and I mean Always, Clean the Hard Drive Before Dumping Your PC. I'll bet Amir will, the next time.

Tuesday, May 23, 2006

419 Operations To Be Recognised By African Governments?

This is a stretch, but just a small one.

IANA awarded the 41.0.0.0/8 subnet to AfriNIC in April 2005.

It takes VERY little imagination to see the 41.9.0.0/16 being a subnet valued by someone. Maybe a Nigerian industrial ISP?


5/23/2006 14:46:09 whois -h whois.arin.net 41.9.0.0

OrgName: African Network Information Center
OrgID: AFRINIC
Address: 03B3 - 3rd Floor - Ebene Cyber Tower
Address: Cyber City
Address: Ebene
Address: Mauritius
City: Ebene
StateProv:
PostalCode: 0001
Country: MU

NetRange: 41.0.0.0 - 41.255.255.255
CIDR: 41.0.0.0/8
NetName: NET41
NetHandle: NET-41-0-0-0-1
Parent:
NetType: Allocated to AfriNIC
NameServer: NS1.AFRINIC.NET
NameServer: NS-SEC.RIPE.NET
NameServer: NS.LACNIC.NET
NameServer: TINNIE.ARIN.NET
Comment:
RegDate: 2005-04-12
Updated: 2005-07-12

OrgAbuseHandle: GENER11-ARIN
OrgAbuseName: Generic POC
OrgAbusePhone: +230 4666616
OrgAbuseEmail: abusepoc@afrinic.net

OrgTechHandle: GENER11-ARIN
OrgTechName: Generic POC
OrgTechPhone: +230 4666616
OrgTechEmail: abusepoc@afrinic.net

# ARIN WHOIS database, last updated 2006-05-22 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.

There's no way that this is a mere coincidence. Blocks 36.0.0.0/8, 37.0.0.0/8, and 39.0.0.0/8 are all available. Don't believe me? Do a WhoIs lookup on "36.0.0.1". Use either
or any WhoIs type tool that you like. Check it.

Somebody in either AfriNIC or IANA has a wicked sense of humour.

Thursday, May 18, 2006

There's A Sucker Born Every Minute

That's an old saying traditionally attributed to the ancient showman P.T. Barnum. Nowadays, that translates into every second.

If you are a MySpace user, you may have gotten a bulletin (mass mailed notice from any one of your "friends") offering you software to track who is viewing your profile. As reported in the Washington Post blog When Spyware Performs as Advertised, when you click on the link in the bulletin (and that's your first mistake), you eventually end up on a page where they state that


the tracking software isn't really available quite yet -- but hey, there's some free adware from 180Solutions Inc. instead!

When you click on the icon that reads "After posting a bulletin CLICK HERE to gain access to myfriendspy.com info," an installation agreement for Zango pops up. Zango is the much-maligned product of adware maker 180Solutions, which of course monitors what you search for and where you go online.

So, though disappointed to not get free tracking software, the sucker (no I meant to say the customer) installs Zango instead. Instead of YOU seeing when your friends view your profile, Zango then watches what YOU do online.

But at least YOU are warned when you install Zango aka MyFriendSpy. They don't hide themselves, like spyware of ancient times. So of course Zango isn't spyware.

Right. Heck, Zango gives you free software to change the colour of your display name. And promises you free access to all Zango supported content across the Internet.


This way to the egress
.

Wednesday, May 17, 2006

Win Some, Lose Some

This week, the good guys lost one.

This is a battle that few were aware of, mainly just the security experts. I only read about it in the news like everybody else.

Several months ago, an Israeli security firm, BlueSecurity, took overt action against the leading world spammers. The spammers, seriously threatened by the action, employed Russian criminals, who used the millions of botted computers in the world, and responded against BlueSecurity and its major customers. Today, BlueSecurity admitted defeat by the spammmers, and closed its doors.

The BlueSecurity website, which earlier today contained a brief statement of defeat, now does not even exist. A quote from the former website, provided by DSLR Forums Spammers Defeat Blue Security:


Over the past few months we were able to leverage the power of the Blue Community and convince top spammers responsible for sending over 25% of the world's spam to comply with our users' opt-out list. We were making real progress in eliminating spam from the lives of our users.

However, several leading spammers viewed this change as a strategic threat to their spam business. The week before last, these spammers launched a series of attacks against us, taking down hundreds of thousands of other websites via a massive Denial-of-Service attack and causing damage to ISPs, website owners and Internet users worldwide. They also began a relentless campaign of email intimidation against any members of the Blue Community.

After recovering from the attack, we determined that once we reactivated the Blue ommunity, spammers would resume their attacks. We cannot take the responsibility for n ever-escalating cyber war through our continued operations.


During the past few weeks, in some of the security forums discussions about this event, some security experts noted a substantial decrease in the spam level. BlueSecurity did make a difference, during their brief struggle. But it was a short lived difference.

Watch your mailboxes.

Tuesday, May 09, 2006

May 2006 Black Tuesday Report

We have 2 Critical vulnerabilities reported by Microsoft today.


  1. MS06-019, aka 916803 - Remote Code Execution.
  2. MS06-020, aka 913433 - Remote Code Execution.

Monday, May 08, 2006

Does IPV6 Have A Future?

One guy thinks not. Todd Underwood, Chief Operations and Security Officer of Renesys Corporation, has some interesting opinions about IPV6. Interestingly enough, some of his observations echo mine.


  • IPv6 is a new network protocol with no interoperability with IPv4 (and no, tunnels don't count).
  • Since virtually every important feature of IPv6 has been back-ported to IPv4 (auto-configuration, security, QoS), there's no compelling reason for any individual user or end-site to want IPv6 service.
  • There are a lot of reasons not to want it. There's no content to look at. This is largely because there are no users. There are no users because there are no other users. And so on.

I became aware of its shortcomings when I tried to assist with a network problem that, in its final analysis, originated from Teredo Tunneling. IPV6 apparently is not compatible with Windows Networking, in Windows XP. Windows Vista has native IPV6 support, built-in to its newly designed IP stack. But I don't think that Vista will drive IPV6, nor vice versa.

Wednesday, May 03, 2006

Firefox V1.5.0.3

Firefox V1.5.0.3 is out - it fixes a possible denial of service vulnerability, and is marked Critical.

If you haven't disabled Automatic Updates in your Firefox installation, it may soon upgrade automatically. My advice? Download and upgrade on your own, when it's convenient. Better than having your bandwidth ties up unexpectedly, or having the computer reboot on you when it's not convenient.

Update 2006/05/11: ISC / SANS reports a Proof Of Concept exploit, published by SecurityView, against a vulnerability in V1.5.0.3 and prior versions. Consider using the workaround described in the SANS article.

Tuesday, February 07, 2006

February 7, 2006 - The Mozilla Firefox V1.5 Exploit Is Out

Last week, the Mozilla folks released Firefox V1.5.0.1. This version includes many changes, driven by security and stability needs, including one major known vulnerability, a potential for remote code execution.

This week, the bad guys released an exploit, that uses the latter vulnerability, as part of the Metasploit Framework. Metasploit Framework, in layman's terms, is a sophisticated library of hacking tools. If your computer is successfully hacked, Metasploit Framework can be used to program your computer with any of a number of different tools, at the will of the hackers.

What does this mean to you? Quite simply, if you're using Firefox (and I hope that you are), it's time to upgrade. Firefox V1.0.7 is vulnerable to many problems fixed by V1.5.0.1. Do everybody a huge favour, and move ahead. V1.5.0.1 has been out for a week, and is widely in use. You too should be using it.