The Latest in IT Security

Posts Tagged ‘1864’

A few months ago on this blog I described PowerLoader functionality including an interesting way for privilege escalation into the explorer.exe system process. The leaked PowerLoader code is also used in other malware families. For example the Win32/Gapz dropper is based on leaked PowerLoader code. In August 2013 we have tracked a new modification of […]

Read more ...

An example of a phishing email I received today, which at first glance appeared to be a legitimate email from a friend, except for a Gmail warning at the top: The text reads: Hope you get this on time, I made a trip to Aberdeen, Scotland and had my bag stolen from me with my […]

Read more ...

Categories

FRIDAY, MARCH 24, 2017

Featured

Archives

Latest Comments

Social Networks