The Latest in IT Security

Posts Tagged ‘public domain’

Security experts are playing a game of cat-and-mouse game with malware authors who are continually looking for ways to bypass detection by anti-malware products.As regular readers of Naked Security will know, one commonly-seen method of distributing malware is to embed an attack inside a malformed PDF. And, one way to hide code inside a malicious […]

Read more ...

03
Feb
2012

Last year I found great x64 shellcode for Windows on McDermott’s site. Not only is it dynamic (lookup API addresses), but it even handles forwarded functions.But it’s written for MASM, and I prefer to use NASM. Hence I translated it, but also normalized it to adhere to the x64 calling convention and fixed a bug […]

Read more ...

The release of WikiLeaks’ unredacted haul of 250,000 secret US diplomatic cables has thrown up an unusual victim: Queen Beatrix of the Netherlands. Although unlikely to be the most harmful, the personal phone number of the 73-year-old Dutch monarch is just one of many pieces of information which probably would have been better not published […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments