what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

cheyenne.003

cheyenne.003
Posted Sep 23, 1999

cheyenne.003 - Microsoft CD infected with the WM.Wazzu virus

tags | virus
SHA-256 | 9272e0239527784eb75b3ed85d2f742fde2fde610bf92512281fffdd5daa922d

cheyenne.003

Change Mirror Download
                                [Cheyenne]

[ Home | Products | Anti-Virus | Firewalls | General Security | Newsline |
Experts ]

---------------------------------------------------------------------------

*************************************************
THE CHEYENNE SECURITY NEWSLINE
***************************************************

October 23, 1996 (Issue #3) THIS MONTH'S HOT STORIES

VIRUS ALERT--MICROSOFT CD INFECTED

The September edition of Microsoft's Solution Provider CD contains a
document infected with the WM.Wazzu virus. This CD is distributed monthly
to all Solution Providers and contains information on Microsoft products,
logos, and other marketing and product information. The infected file is
ED3905A.DOC and is located in the directory \SIA\MKTOOLS\CASE.

Wazzu is a macro virus which infects Microsoft Word documents. It first
appeared this spring, and because it was posted to an Internet newsgroup,
the virus has become more prevalent in the past few months. While the Wazzu
virus is not dangerous, it can be a nuicense --all Word documents residing
on an infected PC or server will be altered. The latest updates for
InocuLAN and Cheyenne AntiVirus can cure the Wazzu virus. For more
information on Wazzu, and InocuLAN visit
http://www.cheyenne.com/security/VBaseWazzu.html

CHECKPOINT ANNOUNCES NEW FIREWALL

CheckPoint Software Technologies LTD announced FireWall-1 3.0 which
provides sophisticated new security and management features which enable
network managers to define and manage a fully integrated and comprehensive
security policy from a central security console. The new firewall features
the ability to protect users from various hazards, including computer
viruses, malicious Java applets and undesirable Web content.

Cheyenne has teamed up with CheckPoint to create the industry's first
integrated firewall and antivirus solution. CheckPoint Software will both
integrate and distribute Cheyenne's InocuLAN anti-virus software with
CheckPoint's FireWall-1 network security software, and the two companies
will work together to further enhance their products for both the Windows
NT and UNIX platforms. http://www.checkpoint.com

CHOOSING ANTIVIRUS SOFTWARE

Each environment is unique, and therefore deserves special consideration
when it comes to choosing the right antivirus software. Cheyenne offers a
paper which can guide you through this important decision by discussing the
various technologies that are available to keep your system virus free.
Whether you are choosing antivirus software for your home or for your
network, this guide highlights topics relevant to managing anti-virus
efforts in today's environment. Its informative, concise and sure to steer
you in the right direction. You can find it at
http://www.cheyenne.com/security/wpchoo3.html

SECURITY ON THE NET

1996 Computer Crime and Security Survey

Survey Highlights:

* Respondents confirmed that their information systems are under siege: of
those responding, 42% have experienced some form of intrusion or other
unauthorized use of computer systems within the last 12 months. Over 50% of
those who experienced intrusions, or attempted probes of their internal
systems, traced those intrusions to on-board employees. Unauthorized probes
were also prevalent from remote dial-in sources and Internet connections.
In terms of frequency of intrusions, 22 of the respondents indicated that
they had experienced 10 or more "attacks" on their systems with the past
year.

* Altering data in an unauthorized manner (known in the trade as "data
diddling") was the most frequent form of attack reported against medical
and financial institutions (36.8% of reported attacks on medical
institutions and 21% of reported attacks on financial institutions).

* Attacks from US.- owned corporate competitors are of serious concern.
Over 50% of respondents cited US. corporate competitors as a likely source
of attacks ranging from eavesdropping to system penetration, and reported
that information sought in recent attacks would be of use to US. -owned
corporate competitors.

* The most significant concern of respondents in regard to eavesdropping,
system penetration and attacks in which intruders forge a return address to
gain access (known as spoofing) centered on independent hackers and
external "information brokers" as likely sources. Disgruntled employees and
corporate competitors were the next most significant concern in these
categories. In terms of security procedures in place to address the above
concerns, the survey revealed the following:

*Over 50% of respondents don't have a written policy on how to deal with
network intrusions.

*Over 60% of respondents don't have a policy for preserving evidence for
criminal or civil proceedings.

*Over 70% of respondents don't have a "Warning" banner stating that
computing activities may be monitored. (Absence of "Warning" banners
hampers investigations and exposes an organization to liability.)

*Over 20% of respondents don't even know if they've been attacked.

*Less than 17% of respondents indicated that they would advise law
enforcement if they thought they had been victimized. Over 70% cited fear
of negative publicity as the primary reason for not reporting.

To obtain a copy of the 1996 Computer Crime and Security Survey write: CSI
600 Harrison St. San Francisco, CA. 94107 (415) 905 2626. Hours 9:00 am to
4:30 pm PST. or email: prapalus@mfi.com

****************************************

SUBSCRIBER INFO

****************************************

Thank you for subscribing to the Security Newsline. You will receive this
service monthly or in the event of a computer security or virus emergency.
Your e-mail address will NOT be used or sold for marketing purposes.

To UNSUBSCRIBE from the Security Newsline, send an e-mail to:
listserv@listserv.cheyenne.com and type the following message in the body
section: unsubscribe security_newsline

To SUBSCRIBE from the Security Newsline, send an e-mail to:
listserv@listserv.cheyenne.com and type the following message in the body
section: subscribe security_newsline

What do you think? What would you like to see? Please send your questions
or comments to: newsline@cheyenne.com. Or visit the Cheyenne Security
Center at: http://www.cheyenne.com/security And please forward this
newsline to anyone you think may find it of value.

Copyright 1996, Cheyenne Software.

All product names and logos are the property of their respective companies.

[Image][Image][Image][Image]
| Home | Contact | Search | Whats New |

Copyright © 1996 Cheyenne Software, Inc. All rights reserved.
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close