Items Tagged with "Exploits"


Trojan Utilizes TeamViewer Remote PC Control Software

January 17, 2011 Added by:Headlines

A popular remote PC control software has apparently been usurped for use in a banking Trojan that was recently used in an unauthorized transaction that affected a large un-named Russian company. The hacker can then execute command and control functions and erasing traces of the bot's presence...

Comments  (0)


Exploiting Software Defects for Profit is Still Illegal

January 15, 2011 Added by:Rafal Los

Apparently through a combination of social engineering of casino floor workers, and "a software glitch" (affectionately referred to as a bug) this group of people was able to steal some very real money. The short of is that they were caught because they got greedy, as they always do...

Comments  (0)


Unpatched Windows Zero-Day Vulnerability Confirmed

January 06, 2011 Added by:Headlines

Windows XP, Vista, Server 2003 and Server 2008 are vulnerable to the exploit, where a malformed thumbnail contained in a document could cause the targeted PC to be infected if the document was opened or even previewed...

Comments  (0)


New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)


Researchers Find Weakness in ZeroAccess Rootkit

November 19, 2010 Added by:Headlines

Though the maleware is not as prevalent as other threats, it has caught the attention of security pros because it is sophisticated, difficult to detect, and nearly impossible to remove without damaging the infected operating system. ZeroAccess acts as a conduit to download and execute other malware...

Comments  (0)


Why an Anti-Virus Can’t Protect You from All Viruses

November 18, 2010 Added by:Dan Dieterle

Many of the modern advanced threats easily bypass anti-virus and then download other viruses onto your machine. Usually Spammer type viruses. The modern threat creators sometimes actually get paid by spammers to download these additional threats to your system...

Comments  (2)


Windows Remains Vulnerable to TDL4 Rootkit

November 17, 2010 Added by:Headlines

How does the old adage go? Something like 'good security efforts always keep us one step behind the bad guys'? The TDSS rootkit exploit known as TDL4, and sometimes referred to as a bootkit, manifests as an infection in the master boot record of a PC by using kernal-level code...

Comments  (0)


iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)


Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)


Computer Security Incident Response

November 04, 2010 Added by:John McGloughlin

This is the first in a series of articles defining a computer security incident response capability (CSIRC) framework and an implementation schema for computer security incident response teams (CSIRT). If you don’t have either of these plans in your organization, you should...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »