Items Tagged with "Exploits"


69dafe8b58066478aea48f3d0f384820

Did Zeus-SpyEye Exploit Toolkit Hit the Black Market?

January 18, 2011 Added by:Headlines

"The developer said the next combined version should be private (not released in an open forum) and with a price near US$4,000. Could this announcement be a scam? Of course, only when we discover a sample of this malware will we know for certain that it is now in the wild"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Trojan Utilizes TeamViewer Remote PC Control Software

January 17, 2011 Added by:Headlines

A popular remote PC control software has apparently been usurped for use in a banking Trojan that was recently used in an unauthorized transaction that affected a large un-named Russian company. The hacker can then execute command and control functions and erasing traces of the bot's presence...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Exploiting Software Defects for Profit is Still Illegal

January 15, 2011 Added by:Rafal Los

Apparently through a combination of social engineering of casino floor workers, and "a software glitch" (affectionately referred to as a bug) this group of people was able to steal some very real money. The short of is that they were caught because they got greedy, as they always do...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Unpatched Windows Zero-Day Vulnerability Confirmed

January 06, 2011 Added by:Headlines

Windows XP, Vista, Server 2003 and Server 2008 are vulnerable to the exploit, where a malformed thumbnail contained in a document could cause the targeted PC to be infected if the document was opened or even previewed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Find Weakness in ZeroAccess Rootkit

November 19, 2010 Added by:Headlines

Though the maleware is not as prevalent as other threats, it has caught the attention of security pros because it is sophisticated, difficult to detect, and nearly impossible to remove without damaging the infected operating system. ZeroAccess acts as a conduit to download and execute other malware...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Windows Remains Vulnerable to TDL4 Rootkit

November 17, 2010 Added by:Headlines

How does the old adage go? Something like 'good security efforts always keep us one step behind the bad guys'? The TDSS rootkit exploit known as TDL4, and sometimes referred to as a bootkit, manifests as an infection in the master boot record of a PC by using kernal-level code...

Comments  (0)

520b811ebc3d9ab82bb52132109ceb7e

iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)

E2c407e8f2b2f7e67cf000863bd588da

Computer Security Incident Response

November 04, 2010 Added by:John McGloughlin

This is the first in a series of articles defining a computer security incident response capability (CSIRC) framework and an implementation schema for computer security incident response teams (CSIRT). If you don’t have either of these plans in your organization, you should...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »