The Latest in IT Security

Posts Tagged ‘operating systems’

A few months ago on this blog I described PowerLoader functionality including an interesting way for privilege escalation into the explorer.exe system process. The leaked PowerLoader code is also used in other malware families. For example the Win32/Gapz dropper is based on leaked PowerLoader code. In August 2013 we have tracked a new modification of […]

Read more ...

While browsing Malaysiakini (a popular Malaysian website) on an Android phone, one of our analysts spotted this advertisement: Clicking on the ad led to an external site displaying the following: Looks reminiscent of the kind of text we’ve seen for years on webpages pushing rogues for Windows systems (and sometimes Mac). Clicking on the “Download […]

Read more ...

03
May
2013

As we first reported in the Microsoft Security Report Volume 13, Keygens have become the number one threat reported by users of Microsoft antimalware products. The research also indicates that 76 percent of users that downloaded Keygen or software cracks were also exposed to other, more dangerous malware.  Keygens are typically not very dangerous on their own. However, […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments