The Latest in IT Security

Posts Tagged ‘1864’

A few months ago on this blog I described PowerLoader functionality including an interesting way for privilege escalation into the explorer.exe system process. The leaked PowerLoader code is also used in other malware families. For example the Win32/Gapz dropper is based on leaked PowerLoader code. In August 2013 we have tracked a new modification of […]

Read more ...

An example of a phishing email I received today, which at first glance appeared to be a legitimate email from a friend, except for a Gmail warning at the top: The text reads: Hope you get this on time, I made a trip to Aberdeen, Scotland and had my bag stolen from me with my […]

Read more ...

Categories

MONDAY, DECEMBER 17, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks