Blog Posts Tagged with "Malicious Code"
August 19, 2012 Added by:Christopher Laing
Activities that threaten your business are the downloading and opening of attachments and Internet files that contain malicious software, and the electronic delivery/distribution of business sensitive information without encryption. This may done either accidentally or deliberately by a disgruntled employee...
July 19, 2012 Added by:Pierluigi Paganini
The Mahdi attack is based on two well known techniques used to deliver malicious payloads, and the huge quantity of data collected reveals the real targets of the operation are government agencies, critical infrastructure engineering firms and financial houses...
June 28, 2012 Added by:Headlines
“The bug will be injected on the remote way, affects the local validation (html/xml) and change the technic back when remotely transferring the password lists. The injection of the malicious URL/domain context can be done via auto save of URLs (victim) or manually (reproduce)," the researchers stated...
May 17, 2012 Added by:Headlines
"The number of malicious Android application package files (APKs) received in Q1 2011 and in Q1 2012 reveals... an increase from 139 to 3063 counts... attributed to malware authors crafting their infected or trojanized applications to defeat anti-virus signature detection..."
May 09, 2012 Added by:Joel Harding
Congressman Wolf, why don’t you establish a program, for the sake of national security, inspecting equipment originating from outside the US, looking for embedded malicious code and backdoors as well as inspecting software updates for that equipment for the same?
May 02, 2012 Added by:Infosec Island Admin
Independent researcher Carlos Mario Peñagos Hollman identified a DLL Hijack vulnerability in WellinTech’s KingView application. WellinTech has created a patch that resolves the vulnerability. Mr. Hollman has tested the patch and verified that it resolves the vulnerability...
March 28, 2012 Added by:Robert Siciliano
QR code infections are relatively new. A QR scam works because, as with a shortened URL, the link destination is obscured by the link itself. Once scanned, a QR code may link to an malicious website or download an unwanted application or mobile virus...
March 28, 2012 Added by:Headlines
The open source browser can now function like a bot and accept commands. It can process the content of the current page where it is located, redirect the user, halt the loading of particular pages, steal passwords, run executables, and even kill itself...
March 15, 2012 Added by:Headlines
The Cisco AnyConnect ActiveX control contains a buffer overflow vulnerability which can allow a remote attacker to convince a user to view a specially crafted HTML document, and the attacker may be able to then execute arbitrary code...
March 14, 2012 Added by:Headlines
"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."
March 05, 2012 Added by:Infosec Island Admin
A buffer overflow vulnerability in the Robot Communication Runtime software used to communicate with IRC5, IRC5C, and IRCP robot controllers could allow an attacker to cause a denial of service and potentially execute remote code with administrator privileges...
March 05, 2012 Added by:Headlines
Google has released Chrome 17.0.963.65 for Windows, Macintosh, Linux and Google Chrome Frame which provides fixes for multiple vulnerabilities identified may have allowed for denial-of-service (DoS) attacks or the execution of malicious arbitrary code...
March 02, 2012 Added by:Infosec Island Admin
Cisco has released six security advisories this week to address vulnerabilities that may allow an attacker to execute arbitrary code, cause a denial-of-service condition, operate with escalated privileges and bypass security restrictions...
February 24, 2012 Added by:Headlines
"Smartphones and tablets are finally delivering consumers with these converged and connected experiences we've been promised for so long. But this is a double edged sword: as smart device usage becomes more sophisticated, so too are cyber criminals' methods of attacking..."
February 21, 2012 Added by:Infosec Island Admin
The 7T TERMIS software is vulnerable to DLL Hijacking. An attacker may place a malicious DLL in a directory where it will be loaded before the valid DLL. This vulnerability may allow execution of arbitrary code and may be exploitable from a remote machine...
February 08, 2012 Added by:Headlines
Researcher Kuang-Chun Hung has identified multiple denial-of-service (DoS) vulnerabilities in the Ing. Punzenberger COPA-DATA GmbH zenon human-machine interface (HMI) system which may allow an attacker to execute a DoS attack and potentially execute arbitrary code...
New Legislation on Threat Intelligence Shari... ut ut on 01-28-2015
Cyber-Civic Responsibility... Anoop birha on 01-28-2015
Dark Technology: Are You (Unknowingly) Putti... Anoop birha on 01-28-2015