Blog Posts Tagged with "Exploits"

69dafe8b58066478aea48f3d0f384820

Researchers Find Weakness in ZeroAccess Rootkit

November 19, 2010 Added by:Headlines

Though the maleware is not as prevalent as other threats, it has caught the attention of security pros because it is sophisticated, difficult to detect, and nearly impossible to remove without damaging the infected operating system. ZeroAccess acts as a conduit to download and execute other malware...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Windows Remains Vulnerable to TDL4 Rootkit

November 17, 2010 Added by:Headlines

How does the old adage go? Something like 'good security efforts always keep us one step behind the bad guys'? The TDSS rootkit exploit known as TDL4, and sometimes referred to as a bootkit, manifests as an infection in the master boot record of a PC by using kernal-level code...

Comments  (0)

520b811ebc3d9ab82bb52132109ceb7e

iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)

E2c407e8f2b2f7e67cf000863bd588da

Computer Security Incident Response

November 04, 2010 Added by:John McGloughlin

This is the first in a series of articles defining a computer security incident response capability (CSIRC) framework and an implementation schema for computer security incident response teams (CSIRT). If you don’t have either of these plans in your organization, you should...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »