Blog Posts Tagged with "Exploits"


Researchers Find Weakness in ZeroAccess Rootkit

November 19, 2010 Added by:Headlines

Though the maleware is not as prevalent as other threats, it has caught the attention of security pros because it is sophisticated, difficult to detect, and nearly impossible to remove without damaging the infected operating system. ZeroAccess acts as a conduit to download and execute other malware...

Comments  (0)


Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)


Windows Remains Vulnerable to TDL4 Rootkit

November 17, 2010 Added by:Headlines

How does the old adage go? Something like 'good security efforts always keep us one step behind the bad guys'? The TDSS rootkit exploit known as TDL4, and sometimes referred to as a bootkit, manifests as an infection in the master boot record of a PC by using kernal-level code...

Comments  (0)


iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)


Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)


Computer Security Incident Response

November 04, 2010 Added by:John McGloughlin

This is the first in a series of articles defining a computer security incident response capability (CSIRC) framework and an implementation schema for computer security incident response teams (CSIRT). If you don’t have either of these plans in your organization, you should...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »
Most Liked