Search Results for
POS
Rootkit cleaner
Rootkits are normally not visible to traditional AVs since they hide by installing themselves as kernel modules, low level hooks and by patching undocumented OS…
Panda Engine
For those interested in a command-line version of the Panda Engine here's one you can use. Specially interesting is the switch to turn on/off the…
New worm: W32/SpyFormShared.A.worm
We have come across a new worm, which has some characteristics that make it suitable for a blog post. The first thing is that it…
Attacks on VoIP
That is the title of the presentation I brought to Auckland and it simply talks about the possible scenario we may be facing in the…
Adware, spyware and PUPs
December 1st, it's review time. This month, adware still holds the first position followed closely by PUPs. We are getting little spyware this time. There are not…
First MS06-70, then WKSSVC
On November 14th, Microsoft released the security bulletin MS06-070, regarding a critical vulnerability in the Workstation service. This vulnerability can be exploited across the Internet,…
Information Leaking: Malware vs. Garbage Bags
In the lab we have lots of examples of malware that steal information. We have banker Trojans, keyloggers, password stealers, etc. We are getting used to hearing about laptop…