The Latest in IT Security

Posts Tagged ‘malicious content’

Part 1 of this blog described and analyzed the CVE-2012-1535 vulnerability in Adobe Flash Player. Here, we describe the fixes and mitigations that can be employed for this and similar exploits. Fixes and mitigations To avoid being vulnerable, you need to update Adobe Flash Player to the latest release from here. Recent versions of Adobe Flash Player […]

Read more ...

The latest variant of the Zeroaccess Trojan-Trojan.Zeroaccess.C-makes use of a novel technique to store its malicious content: it exploits a feature provided by the NT File System called Extended Attributes (EA).Even before Zeroaccess.C, malware authors have been looking for new ways to hide their malicious creations by making use of a specialized API provided by […]

Read more ...

We were alerted to this from a customer reporting that Zscaler was blocking pages on www.computerworldmexico.mx And as evidence of this, was our Zulu report – which when we looked at it showed that the page itself did not have any malicious content / reason But the site’s own internal JS files were being flagged as […]

Read more ...


Categories

SATURDAY, MAY 31, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments