Blog Posts Tagged with "backdoor"

69dafe8b58066478aea48f3d0f384820

Multi-Platform Malware Targets Both Widows and Mac OS

April 27, 2012 Added by:Headlines

"If the threat is running on a Mac operating system, it downloads a dropper type malware written in Python. However, if the threat is running on a Windows operating system, it downloads a standard Windows executable file dropper. Both droppers drop a Trojan horse program..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SabPub - The Latest Mac OS X Backdoor Java Exploit

April 16, 2012 Added by:Headlines

"This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks... The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Verizon Breach Report – Application Security Specific Highlights

March 28, 2012 Added by:Fergal Glynn

Eight-one percent of attacks utilized hacking. There was a stark difference between large and small organizations. SQL injection comes in 3rd after use of stolen logins and exploitation of backdoor or command and control channel. It is tied with dictionary attacks...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

296634767383f056e82787fcb3b94864

The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users?

March 11, 2012 Added by:Ali-Reza Anghaie

The No More Free Bugs effort has changed the landscape by which security research is done. Before, you had one monetized market for such research - the black market. Now a new player has entered the fray - Government - and I'm not entirely sure I like where this is going...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Panda Security Suffers the Wrath of AntiSec

March 07, 2012 Added by:Kevin McAleavey

The defacement also show tremendous amounts of sensitive corporate information including internal accounts, passwords, server and cloud configurations, access information to the antivirus lab's Teamviewer as well as alternate means of accessing their internals via "logmein"...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Stealth Code for New Mutation of PHP Bot Infector

February 21, 2012 Added by:Brent Huston

I found a new mutation of a PHP bot infector, with zero percent detection by AV software. When I decoded the PHP backdoor I got 17 AV hits on it. This leads to the question about evasion techniques and how effective anti-virus applications are at doing code de-obfuscation...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

When a Tool Becomes a Weapon

February 01, 2012 Added by:Alan Woodward

The Metasploit Project is an extremely valuable tool. However, a recent development which was revealed demonstrates just how easily the Metasploit Framework can be used to develop malicious payloads that avoid detection by the usual Anti-Virus and Firewall software...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

ICS-CERT: Multiple PLC Zero-Day Vulnerabilities

January 24, 2012 Added by:Headlines

The vulnerabilities purportedly include buffer overflows, backdoors, weak authentication and encryption, and other vulnerabilities that could allow an attacker to take control of the device and interfere or halt the process it controls...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Backtrack 5: Penetration Testing with Social Engineering Toolkit

January 11, 2012 Added by:Dan Dieterle

Why spend days, weeks or even months trying to penetrate layers of network security when you can just trick a user into running a file that allows you full access to their machine and bypasses anti-virus, firewalls and many intrusion detection systems?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rim, Nokia and Apple Providing Government Back Doors

January 09, 2012 Added by:Pierluigi Paganini

Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...

Comments  (9)

B64e021126c832bb29ec9fa988155eaf

Malware Infection Rates – Who Has the Most Viruses?

December 07, 2011 Added by:Dan Dieterle

A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Building a Backdoor

October 29, 2011 Added by:Joel Harding

A friend in another country wrote and asked me if the reason the United States suspected foreign equipment of containing a means of gaining surreptitious access to telecommunication, information or networked systems, commonly called a backdoor, was because the US routinely does it...

Comments  (0)

C9f10ffa24531c96d85e0445499fd1e4

Browser-Based Malware: Decoding a PHP Backdoor

October 20, 2011 Added by:john melvin

This article is not an analysis of the backdoor, but instead describes the methodology and techniques used to decipher malicious code embedded and encoded in a seemingly normal web page. The following is a snippet of the PHP code that caught my attention and began my investigation...

Comments  (1)

Page « < 1 - 2 - 3 > »