Blog Posts Tagged with "Antivirus"

37d5f81e2277051bc17116221040d51c

OddJob Trojan Hijacks Online Banking Sessions

June 14, 2011 Added by:Robert Siciliano

The OddJob Trojan hijacks online banking sessions, keeping users’ accounts open after they think they’ve quit. Hackers can then access the open account to make fraudulent transactions. When your computer’s security is lax, you’re vulnerable to malware or malicious software...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Remote DLL Injection with Meterpreter

June 09, 2011 Added by:Rob Fuller

What sets that method apart is the fact that the suspension (once the DLL injection occurs) comes from within the process, and it suspends all the child processes as well. Another way you can do this without the injection is just sending a suspend to all the threads in the process...

Comments  (0)

E973b16363b3de77b360563237df7e32

Mac Antivirus - Being Careful and Staying Safe

June 09, 2011 Added by:Bozidar Spirovski

What antivirus software packages have a Mac version? As of June 2011, Wikipedia lists that only 16 out of 62 antivirus software packages support the Mac. In a very interesting marketing move, some antivirus manufacturers actually offer free use of antivirus packages for Mac...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

How to Recognize and Analyze a Fake Anti-Virus Message

May 05, 2011 Added by:Dan Dieterle

Trying to figure out how I was redirected to this fake AV site from clicking on a Google image, I found something interesting. Hovering over the picture, I noticed that the website that showed up under the image looked legit, but the image URL pointed to a completely different website...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Accompanied by Signed Digital Certificate

April 15, 2011 Added by:Headlines

Researchers at have identified a Zeus Trojan variant accompanied by a signed digital certificate. The presence of a signed certificate from a legitimate CA makes the task of identifying and defending against the malware more difficult for antivirus software and file scanners...

Comments  (0)

39b6d5c1d3c6db11155b975f1b08059f

Data Loss Prevention: Less Flip this Week

April 14, 2011 Added by:Ron Lepofsky

Data leakage prevention technology tackles both data at rest residing within a network and specifically on disk storage and of course when data is in motion. Vendors of these technologies vary in what elements of the problem they wish to tackle. Some try to solve all possible problems...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats - Blame It On REO

April 10, 2011 Added by:J. Oquendo

We can never stop an attacker from trying to compromise us, it is out of our control. This does not mean that we cannot stop connections from leaving that machine. After all, controlling what leaves a machine will always be more important than what is coming INTO a machine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LizaMoon Malware Attack Continues to Spread Rapidly

April 04, 2011 Added by:Headlines

The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Who’s NAPping on Your Network? (Part Two)

March 17, 2011 Added by:Global Knowledge

In the last post I described a high-level overview of 802.1x authentication. Now, let’s dive a bit deeper into the use of 802.1x as a foundation for Network Access Protection (NAP) enforcement of health policies in a Windows Server 2008 network infrastructure...

Comments  (2)

F7e202a206691e473e509d080620af68

Metrics for Measuring Enterprise Malware Defenses

February 10, 2011 Added by:Lenny Zeltser

Tracking metrics related to security controls gives CISOs and business executives the ability to steer the security program in the right direction. Without metrics, the security program exists as an art project, rather than an engineering or business discipline...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Claim First Hack-Free Software Development

February 02, 2011 Added by:Headlines

A team of Australian researchers claim to have produced the first hack-free software designed to be malware resistant. Open Kernel Labs (OK Labs) has produced the "seL4", an operating system microkernel that touts the ability to successfully regulate all access to a computer's hardware...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Intel Technology Will Eliminate Zero-Day Threats

January 26, 2011 Added by:Headlines

"The best security is a combination of hardware and software. Hardware security can be stronger and faster in some situations, but isn't as flexible as software-only mechanisms. The big change here is that it sounds like Intel is pulling security functions into the chip or the chipset..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bohu Trojan is Designed to Disable Cloud Antivirus

January 20, 2011 Added by:Headlines

The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PDFs Now Leading Source of Malware Attacks

January 18, 2011 Added by:Headlines

Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Do Too Many Controls Increase Risk?

January 09, 2011 Added by:Mark Gardner

Implementation of controls such as IDS / IPS / AV or non-technical controls such as screening of individuals are examples of controls that may work on implementation, but unless they are updated or re-screened over time, they do not take account of changes in circumstances...

Comments  (1)

Page « < 3 - 4 - 5 - 6 - 7 > »
Most Liked