The Latest in IT Security

Posts Tagged ‘vectors’

18
Dec
2011

Last week reports surfaced about a “zero-day” exploit for Adobe Reader (CVE-2011-2462) that had been actively used in targeted attacks beginning in November. The malicious PDFs were emailed to targets along with text encouraging the target to open the malicious attachment. If opened, the malware known as BKDR_SYKIPOT.B installs onto the target system. The reported […]

Read more ...

We have published the Security Advisory for Adobe Reader and Acrobat informing the users about the vulnerability found in the Adobe Acrobat and Adobe Reader which is currently actively exploited. The vulnerability in the U3D component allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as […]

Read more ...

24
Nov
2011

I’ve been doing some research into the current state of SEP (search engine poisoning) attacks lately — in fact, I meant to do a post about Halloween-themed SEP last month, but had too much travel going on. So, since we’re approaching the Thanksgiving holiday weekend, and since I’ve done some posts in previous years on […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments