Search Results for
POS
A curious technique of social engineering
We have recently detected many infections of Trj/Abox.A. This high number of infections is due to the curious technique of social engineering that it uses…
More fakecodecs!!!
Lately we have noticed an increase in the detection of fake codecs. They are supposed to be codecs that allow users to watch certain videos,…
MS deny the execution of IE7 if the executable file name isn't iexplore.exe
Some days ago, while we were doing some of our research, we discovered a strange IE 7 behavior or "feature". We were trying to execute…
Wifi comments ( Update )
We have received some comments, on our last post. There we said " 2.- Use encription WEP/WPA, something is better than nothing, although we know…
Packing a punch
"80% of new malware defeats antivirus" according to AusCERT. Runtime packers and cryptors are some of the main tools in a malware writers' toolbox. By…
Spam in PHP forums (II)
One reader has pointed that although requiring a user to register is a good idea, some bots are able to do so, and has sent some…
Spam in PHP forums
Today we have found that in a php forum, someone was posting spam messages. It was obvious in this particular case, because it was a…