Blog Posts Tagged with "backdoor"

91648658a3e987ddb81913b06dbdc57a

W32.Duqu - Harbinger of the Next Stuxnet?

October 19, 2011 Added by:Ron Baklarz

The new malcode has so much in common with Stuxnet, it is purported to have been written by the authors. W32.Duqu's primary purpose is intelligence gathering by focusing on industrial control system manufacturers with likely intent on future attacks against targeted victims...

Comments  (1)

07c90faf3632560a12dd6e98069813f2

Avoid Becoming a Security Statistic

October 12, 2011 Added by:Konrad Fellmann

Some organizations hoard data, but have no idea why. A business owner needs to figure out why the data needs to be kept, who will use the data, and how long it needs to be kept for business, legal or contractual reasons. Once defined, IT can implement proper controls to protect the data...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

News Applications: Considerations and Dangers

October 12, 2011 Added by:Joel Harding

The next wave of cyber attacks will come through smart phones, cell phones and their data networks. Smart phones are almost ubiquitous and attacks launched either using the smart phones or attacking smart phones will be devastating on a scale we have not seen to date...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Backtrack 5: Linux and Mac Vulnerable to Malicious Scripts

August 31, 2011 Added by:Dan Dieterle

Malicious scripts and executables are encoded and obfuscated to purposely bypass anti-virus programs. Once they are run on a target machine - Windows, Mac or Linux - they connect through the firewall to the attacker's machine. It is imperative to educate your users about these attacks...

Comments  (2)

4ed54e31491e9fa2405e4714670ae31f

Using Meterpreter Script – StickyKeys.rb

July 18, 2011 Added by:Kyle Young

This script places a backdoor onto a Windows victim system. The sethc.exe program is the sticky keys program. To activate you just have to hit the shift key 5 times and sethc.exe will be executed. While this can be useful for those who are disabled, there is also an abuse for this feature...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

DHS: Imported Devices Infected with Malware

July 12, 2011 Added by:Headlines

Department of Homeland security officials are warning of weaknesses in the technology supply chain that result in the importation of devices that are already infected with malware, spyware, backdoors and other malicious code that leave the units vulnerable to exploitation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Overrun with Osama Bin Laden Malware Traps

May 02, 2011 Added by:Headlines

When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Has The Sun Set On LizaMoon?

April 08, 2011 Added by:Alexander Rothacker

If an organization didn’t catch the attack and the hackers covered their tracks, they might not know of the breach. What if the attackers set up backdoors to come back another time? Now they know exactly where to look for the organization’s critical data – who is to say they won’t be back?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Feds Employ Multiple Encryption Bypass Techniques

February 23, 2011 Added by:Headlines

"We believe we don't have the legal authority to force you to turn over your password unless we already know what the data is. It's a form of compulsory testimony that we can't do... Compelling people to turn over their passwords for the most part is a non-starter..."

Comments  (0)

4332ff2719b3cf30e44538f49b87f88f

Where's My Creeper Box?

February 13, 2011 Added by:Dave Porcello

Indeed, after 7 years my long-coveted creeper box has finally arrived. And nothing says Sneakers like a text message from an elegantly-placed drop box as you exit your target facility’s parking lot in an unmarked utility van...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Report: Half of All Computers Infected with Malware

February 08, 2011 Added by:Headlines

Nearly sixty percent of the infected computers scanned showed the presence of a Trojan, followed by the traditional virus at nearly thirteen percent, and what is classified as a worm at just under ten percent...

Comments  (1)

Page « < 1 - 2 - 3 > »