Blog Posts Tagged with "Code Injection"

03b2ceb73723f8b53cd533e4fba898ee

New Variant of Shylock Banking Malware Spread via Skype

January 20, 2013 Added by:Pierluigi Paganini

The first version of the malware demonstrated an improved methodology for injecting code into browsers to remotely control the victim's device and an improved evasion technique to prevent detection by common antivirus software...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Drone Wars – When Cyber Warfare Becomes Real

November 08, 2011 Added by:Dan Dieterle

Much hype has been heard in the media about cyber war but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage. The comparison to “war” really hasn’t been justified. But what if a drone based virus could change friend to a foe?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Skype Vulnerable to HTML/JavaScript Code Injection

August 23, 2011 Added by:Headlines

"Does it make sense to allow users to 'embed' HTML code in their Skype profile and especially in those 'phone number' fields? Also, there is no option to define any HTML code in Skype client. I was able to find those bugs with Linux Skype client. I guess they don't focus so much on that client..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LizaMoon Malware Attack Continues to Spread Rapidly

April 04, 2011 Added by:Headlines

The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Patriot Hacker The Jester's Libyan Psyops Campaign

March 29, 2011 Added by:Anthony M. Freed

Libyan Psyops Campaign? The Jester appears to be performing some kind of a bit.ly-obfuscated intermediary-based code injection to plant articles in the The Tripoli Post and The Malta Independent reporting that Gaddafi's troops are suffering from low morale and deserting their posts...

Comments  (3)

0b8d1c9dc5f4a80e6646d8d18b8683fe

Cross-Site Scripting (XSS) - Some Examples

January 27, 2011 Added by:Ben Keeley

A reflected XSS vulnerability is when ‘code’ is injected into a website in such a way so as to deliver a payload or to produce a result on the end users browser. Reflected XSS vulnerabilities are delivered to a victim via various means such as an email causing the user to click on a malicious URL...

Comments  (1)