The Latest in IT Security

Posts Tagged ‘Source Code’

03
Feb
2012

Last year I found great x64 shellcode for Windows on McDermott’s site. Not only is it dynamic (lookup API addresses), but it even handles forwarded functions.But it’s written for MASM, and I prefer to use NASM. Hence I translated it, but also normalized it to adhere to the x64 calling convention and fixed a bug […]

Read more ...

A key element for a successful spam/malicious page is to establish trust with the visitor so that he will perform the requested actions. Users trust their browser, but not necessarily the content (i.e. web page) that it displays. A trick that I’ve blogged about earlier, is to fool the user into thinking that certain elements […]

Read more ...

This morning WebsenseR ThreatSeekerR Network alerted us that if a user enters the term “Download Chrome” in Google Search, the 36th result would result in potentially malicious content being downloaded to the user’s machine.I’ll briefly describe the attack vector in which the content is sent to the user.Web Search Search for “Download Chrome”: The 36th result leads to […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments