Blog Posts Tagged with "Windows"

69dafe8b58066478aea48f3d0f384820

Fake Windows Security Updates Spread Zeus Trojan

May 13, 2011 Added by:Headlines

In the run-up to Microsoft's Patch Tuesday, Windows users are being warned of an email spam campaign designed to infect PC's with the Zeus Trojan. Researchers indicate the malware spam operation began on Friday, May 6, and is still actively delivering the fake update alerts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Multi-platform Java Botnet Targets Widows and Mac OSX

May 06, 2011 Added by:Headlines

Multi-platform malware is not entirely new, but with the increasing popularity of Apple products in the marketplace, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Did You Get the FakeRean Windows Virus?

May 01, 2011 Added by:Global Knowledge

The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MITM Attack Exploits Windows IPv6 Protocols

April 06, 2011 Added by:Headlines

“All these Windows boxes will default connect to the evil router instead of the legitimate router when this parasitic overlay is running. If Microsoft didn't have that configuration by default, it would negate a lot of the effects of the attack..."

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Windows Support Scam Update

April 01, 2011 Added by:Simon Heron

This scam involves fraudsters cold calling people claiming to be a Windows support tech and getting the victim to give them remote access to their PCs in the guise of helping them ‘cleanse’ their systems – as long as the victim hands over money or in some cases much more...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Who’s NAPping on Your Network? (Part Two)

March 17, 2011 Added by:Global Knowledge

In the last post I described a high-level overview of 802.1x authentication. Now, let’s dive a bit deeper into the use of 802.1x as a foundation for Network Access Protection (NAP) enforcement of health policies in a Windows Server 2008 network infrastructure...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Hewlett Packard to Switch to WebOS on Future PC’s

March 11, 2011 Added by:Dan Dieterle

It looks like Microsoft may be forced into making a decision. To change and adapt to the times, or continue with business as usual and end up becoming obsolete. But hey, they still have the XBox right?

Comments  (1)

D8853ae281be8cfdfa18ab73608e8c3f

Destructive DOSKEY Aliases

March 07, 2011 Added by:Rob Fuller

The great thing is that there isn't a /delete - you just have to know that in order to remove a doskey macro you need to issue the command without the aliased part, so 'doskey tasklist=' will delete the tasklist macro...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Nearly Twenty Million New Malware Threats in 2010

January 31, 2011 Added by:Headlines

Almost twenty million new malware threats were identified in 2010, according to research by IT lab AV-Test. The number is more than fifty percent greater than those identified in 2009, and the trend shows an increase in the prevalence of unique malware samples over the last ten years...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bohu Trojan is Designed to Disable Cloud Antivirus

January 20, 2011 Added by:Headlines

The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Unpatched Windows Zero-Day Vulnerability Confirmed

January 06, 2011 Added by:Headlines

Windows XP, Vista, Server 2003 and Server 2008 are vulnerable to the exploit, where a malformed thumbnail contained in a document could cause the targeted PC to be infected if the document was opened or even previewed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fake Windows Security Update Spreading Malware

January 04, 2011 Added by:Headlines

A fake security update notification for Windows is spreading malware code that installs an auto-run worm on PCs. There may be other versions of the email circulating which may contain variances in the sender, subject line, file name and email text. The content of the email is as follows...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Complete PCI DSS Log Review Procedures Part 5

December 26, 2010 Added by:Anton Chuvakin

This section covers periodic log review procedures for applications in scope for this project. Such review is performed by either application administrator or security administrator. The basic principle of PCI DSS periodic log review is to accomplish the following...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Addressing the Post-Stuxnet Landscape

December 16, 2010 Added by:Chris Blask

In the shadow of Stuxnet it is no longer diligent for Control System operators to put off addressing the issue of computer-based attacks on their systems. Neither is it realistic to expect Control System operators to introduce the level of uncertainty intrinsic in securing the Controllers..

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Defenses Against DDoS Attacks Are Few, If Any

December 14, 2010 Added by:Headlines

There is actually is a way that would put an end to most DDoS attacks. It requires that all Windows-based botnets be ripped out by the roots. Too bad, that’s not going to happen. Since we’re not going to be rid of Windows anytime soon and it’s not going to get any safer...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

No Sign of Stuxnet in Critical U.S. Systems - So Far

December 08, 2010 Added by:Headlines

Only a small part of the Stuxnet code would have to be re-written by rogue groups to disrupt SCADA systems. It can be easily done, because all SCADA systems run on Windows. After the arrival of Stuxnet, shutting down the entire power infrastructure of a city is no longer science fiction..

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »