The Latest in IT Security

Posts Tagged ‘test machine’

We recently discovered a file sitting on Dropbox which turned out to be a very good way to give your PC a very bad hair day. The file is now inaccessible – the page gives the following message: Restricted Content This file is no longer available. For additional information contact Dropbox Support. However, we thought […]

Read more ...

Over the past month, we have observed several large spam campaigns with malicious HTML attachments. We believe the botnet behind these campaigns is Cutwail. Here is data we collected, starting from the first day of 2012, illustrating spikes of spam with malicious HTML attachments: Attaching an HTML file to an email is a tactic we […]

Read more ...

I’ve written about Shell Extension without ASLR support before. Not only do they open up explorer.exe to ROP attacks, but other applications too, like Adobe Reader and Microsoft Office. You could use EMET to force ASLR on these DLLs, assuming you know which applications load shell extensions. Because shell extensions are not only loaded into […]

Read more ...


Categories

WEDNESDAY, DECEMBER 02, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments