This weeks e-threat activity has focused on dangerous trojans and variations of already public exploits. They make use of still unpatched vulnerabilities in...
Last week's commentary piece dealt with the DNS disclosure debacle. This one's about disclosure done right.
Rootkits are extremely advanced pieces of malware, built with complete stealth in mind.
Connectivity is a critical aspect when it comes to botnets.
A botnet may be small or large, depending on the complexity of malware running on the infected machines.
This weeks e-threat activity seems to have focused on a couple of ActiveX control exploits that spread malware unhindered.
The pattern is known from years and years of similar experiences: A security researcher publishes an exploitable flaw in software or announces the vendor(s)...
Exploits target specific vulnerabilities in the software running on a system.
After last weeks appearances in the Storm Worm world, we have found new threats emerging on the same storyline.