The Latest in IT Security

Posts Tagged ‘automatic execution’

I recently obtained a PoisonIvy sample which uses a legitimate application in an effort to stay under the radar.In this case, the PoisonIvy variant detected as BKDR_POISON.BTA (named as newdev.dll) took advantage of a technique known as a DLL preloading attack (aka binary planting) instead of exploiting previously known techniques. The malware was located in […]

Read more ...

Flamer has the ability to spread from one computer to the next. However, Flamer does not automatically spread, but instead waits for instructions from the attackers. Flamer can spread using the following methods: Through network shares using captured credentials, including Domain Administrator Through the Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability (CVE-2010-2729), previously […]

Read more ...

* The trend shows the change in rank compared to the previous month What can you do to be protected?Apart from using a comprehensive security solution, home users are highly recommended to keep their system and all of its components (operating systems, software, plug-ins,.) up-to-date.  Special advice: JavaProceed to the online Java version detection: www.java.com/en/download/installed.jspIn […]

Read more ...


Categories

THURSDAY, APRIL 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments