Blog Posts Tagged with "sandboxing"


The 3 Must Knows of Sandboxing

June 04, 2018 Added by:Boris Vaynberg

While sandboxes do provide a layer of prevention in a cyber threat prevention strategy, they come with a tax that may be too high for most organizations to pay.

Comments  (0)


Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)


Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)


Nine Tips for CSOs to Get a Fresh Start this Spring

April 13, 2012 Added by:Jason Clark

With everything in the threat landscape changing so frequently, it’s important to reassess your current status and plan for the coming year, whenever we can come up for air. So, I came up with the following nine tips to help you get a fresh start this spring...

Comments  (1)


Some Thoughts on Sandboxes

March 22, 2012 Added by:Rafal Los

Developer should be writing good code, period. But when the pace of developing outpaces the ability to do complete software security analysis we see security organizations turning to sandboxing as a method of limiting the damage an exploited piece of code can do...

Comments  (0)


Are We Admitting Defeat on Mobile Security?

February 17, 2011 Added by:Lee Mangold

Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...

Comments  (0)


Google Bounty: $20K to Hack Chrome at Pwn2Own

February 03, 2011 Added by:Headlines

Google has set a $20K bounty for the successful hacking of the Chrome browser in the Pwn2Own 2011 competition. To exploit a sandboxed program like Chrome, researchers require two vulnerabilities: The first to allow their attack code to escape the sandbox, and a second to exploit a Chrome bug...

Comments  (2)


Is Sandboxing the End-All Solution?

January 01, 2011 Added by:Dan Dieterle

When you have millions of lines of code, like you have in an Operating System, you will have bugs. Hackers can use these coding bugs to create exploits. Microsoft and Adobe products have been a favorite target for hackers. But how do you protect software from hackers when there are unknown bugs?

Comments  (1)


Analysis: Flash Player in a Chrome Sandbox

December 22, 2010 Added by:Rafal Los

The problems Adobe has had lately keeping itself off the 0-day list week after week doesn't bode well for the trust that browser makers have in the product... and apparently Google Chrome is the first to come out and drop Flash player right into a sandbox...

Comments  (0)


Sandboxing: Understanding System Containment

November 29, 2010 Added by:Jamie Adams

The idea of containment within an operating system is sometimes referred to as sandboxing. Some of the more popular technologies specifically designed to accomplish this come to mind: FreeBSD jails, Solaris Containers (including Solaris Zones), and SUSE Linux's AppArmor...

Comments  (5)