Blog Posts Tagged with "Antivirus"
OddJob Trojan Hijacks Online Banking Sessions
June 14, 2011 Added by:Robert Siciliano
The OddJob Trojan hijacks online banking sessions, keeping users’ accounts open after they think they’ve quit. Hackers can then access the open account to make fraudulent transactions. When your computer’s security is lax, you’re vulnerable to malware or malicious software...
Comments (0)
Remote DLL Injection with Meterpreter
June 09, 2011 Added by:Rob Fuller
What sets that method apart is the fact that the suspension (once the DLL injection occurs) comes from within the process, and it suspends all the child processes as well. Another way you can do this without the injection is just sending a suspend to all the threads in the process...
Comments (0)
Mac Antivirus - Being Careful and Staying Safe
June 09, 2011 Added by:Bozidar Spirovski
What antivirus software packages have a Mac version? As of June 2011, Wikipedia lists that only 16 out of 62 antivirus software packages support the Mac. In a very interesting marketing move, some antivirus manufacturers actually offer free use of antivirus packages for Mac...
Comments (0)
How to Recognize and Analyze a Fake Anti-Virus Message
May 05, 2011 Added by:Dan Dieterle
Trying to figure out how I was redirected to this fake AV site from clicking on a Google image, I found something interesting. Hovering over the picture, I noticed that the website that showed up under the image looked legit, but the image URL pointed to a completely different website...
Comments (1)
Zeus Trojan Accompanied by Signed Digital Certificate
April 15, 2011 Added by:Headlines
Researchers at have identified a Zeus Trojan variant accompanied by a signed digital certificate. The presence of a signed certificate from a legitimate CA makes the task of identifying and defending against the malware more difficult for antivirus software and file scanners...
Comments (0)
Data Loss Prevention: Less Flip this Week
April 14, 2011 Added by:Ron Lepofsky
Data leakage prevention technology tackles both data at rest residing within a network and specifically on disk storage and of course when data is in motion. Vendors of these technologies vary in what elements of the problem they wish to tackle. Some try to solve all possible problems...
Comments (0)
Advanced Persistent Threats - Blame It On REO
April 10, 2011 Added by:J. Oquendo
We can never stop an attacker from trying to compromise us, it is out of our control. This does not mean that we cannot stop connections from leaving that machine. After all, controlling what leaves a machine will always be more important than what is coming INTO a machine...
Comments (0)
LizaMoon Malware Attack Continues to Spread Rapidly
April 04, 2011 Added by:Headlines
The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...
Comments (0)
Videos and Multimedia are Most Popular Malware Traps
April 01, 2011 Added by:Headlines
"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."
Comments (0)
Who’s NAPping on Your Network? (Part Two)
March 17, 2011 Added by:Global Knowledge
In the last post I described a high-level overview of 802.1x authentication. Now, let’s dive a bit deeper into the use of 802.1x as a foundation for Network Access Protection (NAP) enforcement of health policies in a Windows Server 2008 network infrastructure...
Comments (2)
Metrics for Measuring Enterprise Malware Defenses
February 10, 2011 Added by:Lenny Zeltser
Tracking metrics related to security controls gives CISOs and business executives the ability to steer the security program in the right direction. Without metrics, the security program exists as an art project, rather than an engineering or business discipline...
Comments (0)
Researchers Claim First Hack-Free Software Development
February 02, 2011 Added by:Headlines
A team of Australian researchers claim to have produced the first hack-free software designed to be malware resistant. Open Kernel Labs (OK Labs) has produced the "seL4", an operating system microkernel that touts the ability to successfully regulate all access to a computer's hardware...
Comments (1)
Intel Technology Will Eliminate Zero-Day Threats
January 26, 2011 Added by:Headlines
"The best security is a combination of hardware and software. Hardware security can be stronger and faster in some situations, but isn't as flexible as software-only mechanisms. The big change here is that it sounds like Intel is pulling security functions into the chip or the chipset..."
Comments (0)
Bohu Trojan is Designed to Disable Cloud Antivirus
January 20, 2011 Added by:Headlines
The Bohu Trojan, which targets machines running Windows, disrupts cloud-based antivirus software by installing a filter in between the hardware and the cloud service provider. Bohu is the first generation of malware that specifically targets cloud-based antivirus software...
Comments (0)
PDFs Now Leading Source of Malware Attacks
January 18, 2011 Added by:Headlines
Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...
Comments (0)
Do Too Many Controls Increase Risk?
January 09, 2011 Added by:Mark Gardner
Implementation of controls such as IDS / IPS / AV or non-technical controls such as screening of individuals are examples of controls that may work on implementation, but unless they are updated or re-screened over time, they do not take account of changes in circumstances...
Comments (1)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization