Jimmy 2004
New Member
- Joined
- Jan 15, 2005
- Messages
- 5,458 (0.78/day)
- Location
- England
System Name | Jimmy 2004's PC |
---|---|
Processor | S754 AMD Athlon64 3200+ @ 2640MHz |
Motherboard | ASUS K8N |
Cooling | AC Freezer 64 Pro + Zalman VF1000 + 5x120mm Antec TriCool Case Fans |
Memory | 1GB Kingston PC3200 (2x512MB) |
Video Card(s) | Saphire 256MB X800 GTO @ 450MHz/560MHz (Core/Memory) |
Storage | 500GB Western Digital SATA II + 80GB Maxtor DiamondMax SATA |
Display(s) | Digimate 17" TFT (1280x1024) |
Case | Antec P182 |
Audio Device(s) | Audigy 4 + Creative Inspire T7900 7.1 Speakers |
Power Supply | Corsair HX520W |
Software | Windows XP Home |
A security flaw has been discovered in Google's Toolbar which could allow criminals to steal data or install malicious software onto people's computers. The flaw works by exploiting the toolbar's ability to install new buttons, and allows a hacker to potentially disguise malicious code as a legitimate button due to the fact that the toolbar does not perform adequate checks when buttons are being installed. To become a victim of the vulnerability, a user would have to be tricked into clicking a link which would open a new popup window asking them to install a custom button, which appears to be installed from a legitimate site such as Google. It then needs to be run from the toolbar, and a user would have to agree to downloading and running an executable. Given the number of steps involved, the flaw is not being treated as critical, and Google is already working on a fix for the problem.
View at TechPowerUp Main Site
View at TechPowerUp Main Site