The Latest in IT Security

Posts Tagged ‘Shell’

As already mentioned in the previous blog post about Flame, the volume of its code and functionality are so great that it will take several months for a complete analysis. We’re planning on continually disclosing in our publications the most important and interesting details of its functionality as we reveal them. At the moment we […]

Read more ...

DreamHost, the popular web hosting provider, has warned customers that one of its database servers has been illegally accessed by a hacker, and that the FTP and shell access passwords of some customers may have been compromised. If it was the case that passwords were taken, that information would certainly be useful to cybercriminals, as […]

Read more ...

24
Sep
2011

Injecting code to system process is common way malware use to avoid being detected by antivirus engine, but now we found a brand new way of such injection. According to the samples we received, they are based on command lines, so we guess this way still remain in demo stage, but we think it may […]

Read more ...


Categories

TUESDAY, MAY 07, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments