Items Tagged with "Attacks"


Keep Your Eyes on this Adobe Zero Day

October 31, 2010 Added by:Brent Huston

A new Adobe exploit is circulating via Flash movies in the last day or so. Looks like the vulnerability is present across many Adobe products and can be exploited on Android, Linux, Windows and OS X. Keep a closer than usual eye out for suspicious new processes running on workstations...

Comments  (0)


Attacking an Unpatched Windows 2008 Server

October 28, 2010 Added by:Bozidar Spirovski

We will use a Windows 2008 target for this demonstration because even if it was released in 2008, and we now have the R2 version, a lot of companies are just starting to implement it. The attack is based on two well known vulnerabilities based on SRV2.SYS driver...

Comments  (0)


Malware Attacks on Electronic Signatures Revisited

October 04, 2010 Added by:Eli Talmor

This post is especially relevant in the context of Zeus Trojan attacks. In 2006 Dr. Hanno Langweg outlined a scheme to analyze the malware attack on electronic signature generating software. He investigated attacks on six different smart-card based electronic signature software products..

Comments  (0)


mCrime Higher on Hackers’ Radar

August 30, 2010 Added by:Robert Siciliano

Over the next few years as millions of smartphones replace handhelds and billions of applications are downloaded, risks of mobile crime - mCrime - will rise. Large antivirus companies are snapping up smaller mobile phone security companies in anticipation of a deluge of mobile attacks...

Comments  (3)


Using Analytics and Modeling to Predict Attacks

August 24, 2010 Added by:Fred Williams

In today's economic climate, any cost savings that a company can eke out is a win. By taking a closer look at data that already exists, companies can make more informed decisions that are optimal and realistic...

Comments  (3)

Page « < 30 - 31 - 32 - 33 - 34 > »