The Latest in IT Security

Posts Tagged ‘buffer overflow’

05
Dec
2012

Malware Analyst Posted: 10 December 2010 Company name: G Data Software AG Location: Bochum Germany Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:JOB DESCRIPTION GData Software AG is looking for Malware Analysts who want to work with a cutting edge team in a company that is rated […]

Read more ...

Intego has been examining several samples of new Mac malware, Tibet.C, which uses Word documents to install a backdoor on Macs. The infected Word files look like real files when users double-click them – they display text just like regular Word files – but actually contain three parts, that are concatenated within the file, and […]

Read more ...

Shortly after Microsoft’s release of Windows 8 Developer Preview, I read an article mentioning the mechanism to prevent ROP (Return Oriented Programming) on Windows 8 and the way to bypass it. Accordingly, I have experimented and provided a ROP chain which could be used for any ROP exploit codes on Windows 8. Let’s talk about […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments