Operating Systems

96f253cc8b3e78f1160a605fb9b56530

More Than Meets the Eye

May 28, 2015 Added by:Chris Elisan

The philosophy of hiding in plain sight has been used both by the good and the bad guys. But the effect of hiding in plain sight is much more pronounced when applied to a malicious attack.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Microsoft and the Software Lifecycle

May 25, 2015 Added by:Tripwire Inc

For some reason, Europe’s ‘The Final Countdown’ was playing in my head as I sat and pondered this write-up. I suppose that’s fitting given that we are about to cross the 60-day mark until Windows Server 2003 goes End-of-Life.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

More Possible Common Threads in Major ICS Cyber Incidents – Unintended System Interactions

May 25, 2015 Added by:Joe Weiss

One of the most important aspects in addressing ICS cyber security is the concept of “systems of systems”. Unlike IT where you can test a box and label it and the system secure, control system cyber security requires testing the overall system.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Updated Dyre, Dropped by Office Macros

May 18, 2015 Added by:Ronnie Tokazowski

We recently analyzed a sample that started out appearing to be Dridex, but quickly turned into a headache leading to Dyre that featured some notable differences to past Dyre samples.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

MacKeeper Patches Serious Remote Code Execution Flaw

May 12, 2015 Added by:Eduard Kovacs

The developers of MacKeeper, the controversial utility software suite for OS X, have patched a critical vulnerability that could have been exploited to remotely execute arbitrary code on affected systems.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Rombertik Strike at MBR Latest in Long Line of Malware Self-Defense Tactics

May 07, 2015 Added by:Brian Prince

The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

This Carding Forum is Spamtacular

May 05, 2015 Added by:Malwarebytes

Credit card fraud is a huge problem, and by its very nature falls across the entire security spectrum.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Flaws in WordPress eCommerce Plugin Expose Over 5,000 Websites

April 30, 2015 Added by:Eduard Kovacs

Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Four Most Common Evasive Techniques Used by Malware

April 30, 2015 Added by:Tripwire Inc

Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Hackers Tricked AT&T, Network Solutions Employees in Tesla Attack

April 28, 2015 Added by:Eduard Kovacs

The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Apple Failed to Properly Fix “Rootpipe” Bug in OS X: Researchers

April 21, 2015 Added by:Eduard Kovacs

Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Law Enforcement, Security Firms Team Up to Disrupt Simda Botnet

April 13, 2015 Added by:Eduard Kovacs

More than a dozen command and control (C&C) servers used by the Simda botnet were seized last week by law enforcement authorities coordinated by Interpol.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

Long Live the Botnet

April 07, 2015 Added by:Or Katz

You might think that being exposed in a security blog post might bring shame to a bot, and that at the very least it might spend some time underground.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Air-Gapped Computers Can Communicate Through Heat: Researchers

March 24, 2015 Added by:Eduard Kovacs

Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »