The Latest in IT Security

Posts Tagged ‘pid’

Last week, McAfee’s Foundstone Incident Response team got hold of a piece of malware that was sent out during a phishing campaign. The campaign targeted several companies and institutes in the United Arab Emirates, Oman, Bahrain, and a couple of Caribbean islands.The executable that was sent with the email was called emiratesstatement.exe and the pictogram […]

Read more ...

I’ve been writing a lot of bash code today as a possible replacement for the current process for maintaining malwareblacklist.com. The original code was written maybe a year ago by someone who no longer works in my department and because it is written in C#, I prefer not to touch it. At the time, the […]

Read more ...

A Teensy dropper presents itself as a keyboard (HID) to a PC and this is how it can be used to drop files even if you don’t allow removable drives. You can prevent the installation of new HIDs, but this is an issue when you need to replace keyboards or mice. Irongeek has a good […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments