It's time for the weekly insight in the e-threats world again. Starting with the 4th of August the BitDefender Team has analyzed a couple of new and not so new...
This weeks e-threat activity has focused on dangerous trojans and variations of already public exploits. They make use of still unpatched vulnerabilities in...
Last week's commentary piece dealt with the DNS disclosure debacle. This one's about disclosure done right.
Rootkits are extremely advanced pieces of malware, built with complete stealth in mind.
Connectivity is a critical aspect when it comes to botnets.
A botnet may be small or large, depending on the complexity of malware running on the infected machines.
This weeks e-threat activity seems to have focused on a couple of ActiveX control exploits that spread malware unhindered.
The pattern is known from years and years of similar experiences: A security researcher publishes an exploitable flaw in software or announces the vendor(s)...
Exploits target specific vulnerabilities in the software running on a system.