Items Tagged with "Attacks"
October 31, 2010 Added by:Brent Huston
A new Adobe exploit is circulating via Flash movies in the last day or so. Looks like the vulnerability is present across many Adobe products and can be exploited on Android, Linux, Windows and OS X. Keep a closer than usual eye out for suspicious new processes running on workstations...
October 28, 2010 Added by:Bozidar Spirovski
We will use a Windows 2008 target for this demonstration because even if it was released in 2008, and we now have the R2 version, a lot of companies are just starting to implement it. The attack is based on two well known vulnerabilities based on SRV2.SYS driver...
October 04, 2010 Added by:Eli Talmor
This post is especially relevant in the context of Zeus Trojan attacks. In 2006 Dr. Hanno Langweg outlined a scheme to analyze the malware attack on electronic signature generating software. He investigated attacks on six different smart-card based electronic signature software products..
August 30, 2010 Added by:Robert Siciliano
Over the next few years as millions of smartphones replace handhelds and billions of applications are downloaded, risks of mobile crime - mCrime - will rise. Large antivirus companies are snapping up smaller mobile phone security companies in anticipation of a deluge of mobile attacks...
August 24, 2010 Added by:Fred Williams
In today's economic climate, any cost savings that a company can eke out is a win. By taking a closer look at data that already exists, companies can make more informed decisions that are optimal and realistic...