Blog Posts Tagged with "Code Injection"


New Variant of Shylock Banking Malware Spread via Skype

January 20, 2013 Added by:Plagiarist Paganini

The first version of the malware demonstrated an improved methodology for injecting code into browsers to remotely control the victim's device and an improved evasion technique to prevent detection by common antivirus software...

Comments  (0)


Drone Wars – When Cyber Warfare Becomes Real

November 08, 2011 Added by:Dan Dieterle

Much hype has been heard in the media about cyber war but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage. The comparison to “war” really hasn’t been justified. But what if a drone based virus could change friend to a foe?

Comments  (1)


Skype Vulnerable to HTML/JavaScript Code Injection

August 23, 2011 Added by:Headlines

"Does it make sense to allow users to 'embed' HTML code in their Skype profile and especially in those 'phone number' fields? Also, there is no option to define any HTML code in Skype client. I was able to find those bugs with Linux Skype client. I guess they don't focus so much on that client..."

Comments  (0)


LizaMoon Malware Attack Continues to Spread Rapidly

April 04, 2011 Added by:Headlines

The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...

Comments  (0)


Patriot Hacker The Jester's Libyan Psyops Campaign

March 29, 2011 Added by:Anthony M. Freed

Libyan Psyops Campaign? The Jester appears to be performing some kind of a intermediary-based code injection to plant articles in the The Tripoli Post and The Malta Independent reporting that Gaddafi's troops are suffering from low morale and deserting their posts...

Comments  (3)


Cross-Site Scripting (XSS) - Some Examples

January 27, 2011 Added by:Ben Keeley

A reflected XSS vulnerability is when ‘code’ is injected into a website in such a way so as to deliver a payload or to produce a result on the end users browser. Reflected XSS vulnerabilities are delivered to a victim via various means such as an email causing the user to click on a malicious URL...

Comments  (1)