Quantcast
Channel: IT Trenches » malware
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Using PsExec to fight malware

The excellent Sysinternals Windows tools have been around for many years (since 1996!). Microsoft now has these tools available and they are all FREE! They are also available in a “live” way such that...

View Article



Search engine for telnet, ftp, ssh and http brings hackers closer to your...

Google is obviously a great tool for everyone including hackers. If you have never heard of Google Hacking, then I highly recommend you take a look at what might be exposed and found through a Google...

View Article

Recipe for malware infection – 10 steps

For certain malware infection follow these steps: 1. Do not apply operating system patches. 2. Do not apply application patches. 3. Do open emails from unknown sources. 4. Do open attachments on emails...

View Article

Google Aurora attack focused on IE6 – does anybody do autoupdates anymore?

Maybe you have heard about the recent news of the attacks against Google known as Aurora. If you haven’t take a look at the stories returned in the Google news search in the previous link. What strikes...

View Article

Malware writers get a little HLP from you

I was roving around today on the McAfee TrustedSource Research Blog website and came across a very interesting entry about malware writers using Help files to mask infection sources. This is not a new...

View Article


Malvertisements – 1.3 million viewed per day!

Last year the NY Times website had advertisements that served up some malicious content (Would you click if it showed on the NY Times website? – Really would you?). Now, in 2010, Dasient has released...

View Article

Investigation indicates trojan contributed to 2008 Spainair crash

El Pais reports that a Spainair computer which tracks airplane maintenance and problem issues was infected by malicious software (trojans) that prevented it from operating properly. The computer should...

View Article

Hackers send exploit code to Microsoft

Go ahead and report why your system crashed – send Microsoft the exploit code you are working on. As most Windows users know, you can send Microsoft details about what caused a system crash. In some...

View Article


Is there an orange ball in information security?

In Japan many retailers have what look like orange balls or waterballoons near checkouts. Bruce Schneier, a leading information security expert, recently blogged about these orange balls as...

View Article


Anatomy of a crimeware rootkit – scary stuff!

I came across a recent tutorial on reverse engineering the ZeroAccess / Max++ / Smiscer Crimeware Rootkit. This is a very malicious rootkit that has features such as: Modern persistence hooks into the...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images