The Latest in IT Security

Posts Tagged ‘Credentials’

While monitoring our Smart Protection NetworkT data, we noticed a suspicious file from the website http://{BLOCKED}bookhacking.com/FacebookHackerPro_Install.exe. From the looks of the domain name, it suggests that it hosts a hacking tool for the social networking site Facebook. When I checked, the file is supposedly capable of obtaining Facebook passwords. Based on our analysis of the […]

Read more ...

Flamer has the ability to spread from one computer to the next. However, Flamer does not automatically spread, but instead waits for instructions from the attackers. Flamer can spread using the following methods: Through network shares using captured credentials, including Domain Administrator Through the Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability (CVE-2010-2729), previously […]

Read more ...

The magazine PC.COM (Malaysia) is publishing on a monthly basis the questions and answers coming from their readers. The editor of the magazine was kind to allow us to publish the questions and the answers I provided. This means that every month we will have a special article with questions and answers. What’s the difference […]

Read more ...


Categories

SATURDAY, MAY 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments