OS & Software

759c37c6aff04cd46262f93652b5fad5

Analysis of the Microsoft MS12-081 Vulnerability

December 19, 2012 Added by:Spencer McIntyre

This vulnerability would be useful for penetration testers and attackers alike depending on how it could be exploited and any other limiting factors. The following information is the result of a technical analysis of the patch on a Windows XP SP3 system...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iran, the cyber shooting range, new malware detected

December 19, 2012 Added by:Pierluigi Paganini

Analysis revealed that the malicious code has a simple and efficient design that allows it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection...

Comments  (4)

Af9c34417f8e5e0d240850bb353b5d40

Security is Inconvenient, Deal With It!

December 17, 2012 Added by:Keith Mendoza

ZD Net had an article entitled "Kernel vulnerability places Samsung devices at risk" and I thought "so, what's new" until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

How to get into your house through SmartTV

December 14, 2012 Added by:Pierluigi Paganini

Security experts posted a video that demonstrates how it is possible to attack a Samsung Smart TV exploiting a 0-day vulnerability to gain root access on it. The hacker could remotely wipe data from attached storage devices, monitoring and controlling the victim TV...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Common Malware Types: Cybersecurity 101

December 12, 2012 Added by:Fergal Glynn

The amount and variety of malicious programs out there is enough to make your head spin. This blog post will break down the common types of malicious programs and provide a brief description of each...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Skynet, the potential use of Tor as a bulletproof botnet

December 10, 2012 Added by:Pierluigi Paganini

In September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor...

Comments  (0)

296634767383f056e82787fcb3b94864

Flipping Malware: A Profit Opportunity for Corporate IT Departments

December 09, 2012 Added by:Jeffrey Carr

Some of the more forward-looking DOD contractors who have robust internal CERT with engineers who do reverse-engineering could be in the best position to offer free or low-cost network defense to corporations who want to "flip" the malware found on their network for a nice profit...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Sophos Security Threat Report 2013, today... tomorrow

December 07, 2012 Added by:Pierluigi Paganini

Sophos was one of the first security firms that has published a report on the security landscape the upcoming year. The document provides an interesting overview on most common and dangerous cyber threats to determine the level of penetration in different countries...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Japan Aerospace Exploration Agency hit again by malware

December 03, 2012 Added by:Pierluigi Paganini

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer...

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 – Part 4.0 – A Three Year Anniversary!

November 25, 2012 Added by:Kyle Young

I still believe the best phone for hackers is the Nokia N900 and it is a shame that Nokia decided to go the way of Microsoft. I personally believe that Nokia should have gone the route of an Android/Linux hybrid mobile operating system, but that’s just my opinion...

Comments  (6)

03b2ceb73723f8b53cd533e4fba898ee

W32.Narilam, the malware that hit databases in Middle East

November 25, 2012 Added by:Pierluigi Paganini

W32.Narilam is a worm that attempts to spread by copying itself to all drives and certain shared folders on the compromised computer, the malware doesn’t include modules to steal information from the victims....

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

November 06, 2012 Added by:Pierluigi Paganini

The rapid diffusion of Android devices has had the effect of increasing the number of malware developed for the OS. During the third quarter 51,447 unique samples were detected. Google has tried to secure it’s OS with the introduction of an additional security layer named Bouncer...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russian Underground is just part of a global criminal network

November 01, 2012 Added by:Pierluigi Paganini

Programming services and software sales was the most common service in the criminal market, where it is possible to buy customized malware agents and any kind of applications to conduct a cyber attack such as spammers, brute-force tools and DDoS bots and exploit toolkits...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Getting System the Lazy Way

October 31, 2012 Added by:f8lerror

We know all that many users are local administrators. We also know we can send or drop binaries to these users and they will run whatever we want them to. The problem lies in when they run the binary if they don’t run it as admin we may not be able to get system level access. To be honest that is the level I want...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Optimism... or Special Interests?

October 31, 2012 Added by:Jayson Wylie

There seems to be some political purpose to the current interests around Kaspersky. They are becoming involved in investigating malware of a cyber weapon nature instead of the constant pursuit of Trojan variants and financial fraud that is more damaging to the masses originating around their home office...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

TrendMicro Q3 Security Report

October 24, 2012 Added by:Pierluigi Paganini

Trend Micro has released the 3Q 2012 SECURITY ROUNDUP that presents a worrying trend for malware growth which increased 483%. This includes cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »