Welcome to stopmalware.co.uk, we are in a unique position to help information security professionals deal with the constant tidal wave of attacks infiltrating infrastructures and evading conventional antivirus engines, firewalls and intrusion detection systems. Stopmalware.co.uk is owned and operated by Omnetix Limited, Omnetix launched stopmalware.co.uk in partnership with FireEye Inc. following a successful deployment of FireEye Malware Protection System appliances, taking in 10 different countries for one of the largest Private Equity (PE) firms in Europe. To find out how we can help you stop malware in your environment quickly and effectively, please send a message through our "Contact Us" page or call us on 0844 351 0309 so we can discuss your requirements further.
We would be happy to arrange an online demonstration, web conference, presentation, datasheets, evaluations or proof of concept. We hope you find these pages useful please feel free to register and join in our community of malware interested professionals.
Microsoft Security Advisory (2490606)
Yesterday Microsoft warned us of a vulnerability in its Windows Graphics Rendering Engine. To that end they have clarified that the systems affected are Windows XP, Server 2003, Vista and Windows Server 2008 with service pack 2 and that Windows 7 and Windows Server 2008 R2 are unaffected. The vulnerability could result in an attacker running arbitary code as if they were withhin a logged on users security security context. However in order to make use of the vulnerability a user would have to be persuaded to visit a specially crafted web page to view a malicious image or open a specific office document containing the malicious image.
Wikipedia has this to say about Operation Aurora. Operation Aurora is a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China.
The most talked-about issue in the security industry in 2010 has been Stuxnet. Some of this attention is rightly due to the attack’s sophistication, but even more is due to breathless speculation about “cyber-warfare,” the alleged links to Israel and Iran, and speculations about the foreign policy effects of Stuxnet. However, all this media attention tended to cloud the issue.