Mr Teso said there was little risk that malicious hackers would be able to use what he found.
"If you look at the numbers, you see that malicious software for Macs is very limited, " he says.
The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the user clicks the displayed icon of a specially crafted shortcut.
April 26th : After a PlayStation Network outage of more than a week, Sony reveals that malicious hackers have gained access to 77 million users account details earlier in the month, including an unknown number of credit cards numbers.
FORBES: As Sony's Breaches Multiply, Has It Entered A Downward Security Spiral?
Connect those data firehoses to computers that have been infected with malicious software that turns them into criminally-controlled botnets, and you can expect them to spew out more malicious traffic than ever.
FORBES: Verisign: Cyber Attacks Will Grow 1000-Fold This Decade
They've worked to teach users to spot and avoid the "phishing" sites that spread malicious software and steal bank codes.
That missing safeguard matters: All Apple products use Data Execution Prevention, or DEP, a feature that prevents malicious code from running its own commands.
The trick could also be used to direct users to sites that install malicious software on their computers and could even intercept e-mail correspondence, Kaminsky says.
Over the past several weeks, researchers have tracked a hacker exploit that's infected more than half a million pages around the Web, invisibly redirecting visitors to those pages to servers that install malicious software on their PCs.
When Comex released JailbreakMe 2 without a patch last year, the company took only two weeks to patch the bugs he or she had exposed, a short enough time that no malicious use of the exploit was spotted in the wild.
FORBES: JailbreakMe Hackers Expose Gaping Security Hole In iPhones--And Fix It Only For Jailbreakers
Specifically, he said that they used malicious software sent via an email that enabled them to intercept his emails for a three-month period in 2006.
WSJ: Singer Charlotte Church Alleges Trade-Off With Murdoch Papers
"I'm not saying that Apple is being malicious -- they have a billion apps in that store, " Higgins said.
That is what malicious marauders did to the makers of silicone breast implants.
People often fall victim by following a link to a booby-trapped website that installs the malicious program when they visit.
And users from those three countries were also the most likely to engage in other risky behavior on work PCs, including reading personal e-mail, downloading music and video and even peer-to-peer file-sharing, a practice that often spreads malicious software or inadvertently gives outsiders access to sensitive documents.
The software giant pledged to fix the update but its efforts became more urgent when security firm EEye Digital Security discovered that the crash circumstances could be exploited to run malicious code on that machine.
The worm that infected computers at the Marine Corps headquarters at the Pentagon early Friday was ExploreZip, an especially malicious virus that typically travels by e-mail, according to a Marine Corps spokesman.
Applications can contain malicious payloads that can compromise a system or pass data to hostile parties.
The MPAA spokesman said many apps that pirated content were malicious in other ways.
The virus was discovered by a Russian security firm that specialises in targeting malicious computer code.
FORBES: The Real Flame Wars: W32.Flamer Found All Over the Middle East
Malicious software that hijacks cellphones to compromise bank accounts or send costly premium text messages may be dangerous.
Still other perpetrators copy apps and inject them with malicious software that causes a victim's phone to automatically send costly text messages.
To deny that others have been malicious in an effort to hurt?
Because this is a malicious app that seems to be relying in the sending of background SMS messages to earn its creators revenue.
Beware emails that purport to be from LivingSocial that are actually from malicious parties seeking to take advantage of known customers of the site.
The New York Times (registration required) takes a deeper look at what happens to computers that get infected by malicious code and taken over.
One scenario is if a person doesn't encrypt their wireless connection, leaving it open to a neighbor or malicious hacker that swaps illegal files.
Next imagine groups of malicious vandals that cannot be seen .
Ransomware is malicious software that hackers use to lock you out of your PC and demand money from you before you can use it again.
Perhaps the biggest concern for users of Internet phone systems is their susceptibility to the same kind of malicious attacks that cripple personal computers every day.
应用推荐