Blog Posts Tagged with "sandboxing"

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)

54b393d8c5ad38d03c46d060fa365773

Nine Tips for CSOs to Get a Fresh Start this Spring

April 13, 2012 Added by:Jason Clark

With everything in the threat landscape changing so frequently, it’s important to reassess your current status and plan for the coming year, whenever we can come up for air. So, I came up with the following nine tips to help you get a fresh start this spring...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Some Thoughts on Sandboxes

March 22, 2012 Added by:Rafal Los

Developer should be writing good code, period. But when the pace of developing outpaces the ability to do complete software security analysis we see security organizations turning to sandboxing as a method of limiting the damage an exploited piece of code can do...

Comments  (0)

Af2769c2480db78c589b811b428782b0

Are We Admitting Defeat on Mobile Security?

February 17, 2011 Added by:Lee Mangold

Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Bounty: $20K to Hack Chrome at Pwn2Own

February 03, 2011 Added by:Headlines

Google has set a $20K bounty for the successful hacking of the Chrome browser in the Pwn2Own 2011 competition. To exploit a sandboxed program like Chrome, researchers require two vulnerabilities: The first to allow their attack code to escape the sandbox, and a second to exploit a Chrome bug...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Is Sandboxing the End-All Solution?

January 01, 2011 Added by:Dan Dieterle

When you have millions of lines of code, like you have in an Operating System, you will have bugs. Hackers can use these coding bugs to create exploits. Microsoft and Adobe products have been a favorite target for hackers. But how do you protect software from hackers when there are unknown bugs?

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Analysis: Flash Player in a Chrome Sandbox

December 22, 2010 Added by:Rafal Los

The problems Adobe has had lately keeping itself off the 0-day list week after week doesn't bode well for the trust that browser makers have in the product... and apparently Google Chrome is the first to come out and drop Flash player right into a sandbox...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Sandboxing: Understanding System Containment

November 29, 2010 Added by:Jamie Adams

The idea of containment within an operating system is sometimes referred to as sandboxing. Some of the more popular technologies specifically designed to accomplish this come to mind: FreeBSD jails, Solaris Containers (including Solaris Zones), and SUSE Linux's AppArmor...

Comments  (5)