Skip to main content

Home/ Information Security/ Group items tagged malware

Rss Feed Group items tagged

David Woodsmall

Complete Robust ROOT - 2 views

Complete Robust ROOTKIT / MALWARE REMOVAL What to do if your Malware Remover APP Does NOT do the Trick http://www.woodsmall.com/complete-robust-rooktkit-malware-removal.htm

rootkit malware stubborn trojans virus

started by David Woodsmall on 09 Jul 14 no follow-up yet
Bart TheGuard

Kaspersky Lab discovers one of the most significant cyber-attacks ever! - 0 views

  •  
    Kaspersky Lab issued an important report on Monday (01.14.2013) about a major, extremely complicated cyber-attack that may have been operating since the year 2007. The famous antivirus company reported that it identified a sophisticated cyber espionage campaign, which targeted a wide range of government and diplomatic organizations located in Eastern Europe and Central Asia as well as in North America and Western Europe. That's some very powerful malware!
Seçkin Anıl Ünlü

How I would Hack your PC, Mac with USB HID - 1 views

  •  
    We live in the world full of serpents, overlook things for seconds and you are bitten to death. Trojans, viruses, malware are everywhere. They find new
Devid Thomas

informática forense - 1 views

  •  
    Hay dos pasos básicamente involucradas en el proceso de forense digital para el seguimiento de un correo electrónico: encontrar la dirección IP en la sección de encabezado de correo electrónico y luego encontrar la ubicación de la dirección IP. Generalmente, usted no conseguirá la ubicación exacta de la persona que le mando el correo electrónico. Por ejemplo, si alguien en México le envía un correo electrónico con Gmail, la última dirección IP en la sección de cabecera será probablemente la dirección IP pública asignada por ISP a ese usuariocuando ese usuario le mando un correo desde el ISP, que le dará la ubicación aproximada como la cuidad o parte de cuidad o Zona. La razón de la amplia gama es que la dirección IP que un ISP asigna a un usuario particular es normalmente dinámico.Esto significa que, la dirección IP que tenían; cuando el correo electrónico fue enviado y ahora puede ser asignada a un usuario diferente en la región. Esta es la principal razón por la que podría obtener una amplia área geográfica cuando se esté buscando la ubicación de la dirección IP durante forense digital.
Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
peerlyst

WannaCry no more: ransomware worm IOC's, Tor C2 and technical analysis + SIEM rules, by... - 0 views

  •  
    After a rather long day, night and morning of studying the news, researching and hunting the #WannaCry ransomware worm there are some discoveries to be shared.. This includes Host and Network IOCs, their analysis obtained with help of fellow security researchers and practitioners, review of C2 infrastructure and its interactions with Tor. Last but not least are some free SIEM use cases. What else should a security practitioner know for their handling of WannaCry?
1 - 11 of 11
Showing 20 items per page