«
Expand/Collapse
96 items tagged "virus"
Related tags:
spam [+],
nprotect [+],
kernel mode [+],
evasion [+],
escalation [+],
barracuda [+],
audio [+],
web [+],
virus scan [+],
sap [+],
dr web [+],
chaos communication congress [+],
vulnerability [+],
virus scanners [+],
virus 7 [+],
video [+],
usa [+],
sql [+],
sap netweaver [+],
privilege [+],
peter eisentraut [+],
online virus scanner [+],
online [+],
norman [+],
netweaver [+],
malware [+],
mail protocols [+],
linux [+],
filter [+],
f prot [+],
e mail service [+],
cross site scripting [+],
computer [+],
china [+],
cat [+],
black hat [+],
antivirus products [+],
anti virus [+],
zombie virus [+],
zombie [+],
writers [+],
wong [+],
weaknesses [+],
virus writers [+],
virus vendors [+],
virus creation [+],
virus activity [+],
txt [+],
techniques [+],
slides [+],
setiri [+],
security component [+],
scanners [+],
scammers [+],
police [+],
pianist composer [+],
neel mehta [+],
million [+],
microsoft [+],
metamorphic [+],
mark stamp [+],
mark ludwig tags [+],
mark ludwig [+],
jason ross tags [+],
jason ross [+],
infecting [+],
hunting [+],
hacker [+],
h. wong tags [+],
google [+],
fake [+],
facebook [+],
exploits [+],
evasion techniques [+],
estsoft [+],
denial of service [+],
critical security [+],
computer virus [+],
component authors [+],
code obfuscation [+],
client side scripts [+],
bypassing [+],
authors [+],
analysis [+],
alyac [+],
alex wheeler [+],
active x [+],
zeus banking [+],
zeus [+],
you [+],
xss [+],
x lion [+],
windows virus [+],
windows security [+],
windows [+],
way [+],
warriors [+],
warns [+],
virus world [+],
virus programming [+],
virus products [+],
virus lab [+],
virus infection [+],
virus data [+],
virus authors [+],
victims [+],
version 6 [+],
vendor [+],
v22 [+],
use [+],
usb drives [+],
update [+],
unix [+],
trio [+],
transcripts [+],
time [+],
the rise [+],
than a real [+],
targets [+],
sweep scan [+],
suspected [+],
still [+],
spy [+],
speaking [+],
sophos anti virus [+],
software maintenance [+],
software bug [+],
siemens [+],
shamoon [+],
sentences [+],
security researchers [+],
security firm [+],
security [+],
sea creature [+],
scanner [+],
rubbish [+],
retrial [+],
replaces [+],
reboot [+],
ransomware [+],
ransom [+],
rabbit [+],
prompts [+],
postcards [+],
police computers [+],
picking [+],
paper [+],
p2p [+],
november [+],
new virus [+],
netwaver [+],
mole [+],
mideast [+],
microsoft software [+],
messes [+],
memory card [+],
memory [+],
malicious users [+],
mac supports [+],
mac operating systems [+],
mac [+],
listeners [+],
lab [+],
korean conference [+],
killer [+],
kernel panic [+],
kama [+],
june [+],
judge sentences [+],
judge [+],
irish [+],
interface [+],
infrastructure [+],
information disclosure vulnerability [+],
infects [+],
infection [+],
infected [+],
improve [+],
hoax [+],
hit [+],
haroon [+],
hacks [+],
greater manchester police [+],
greater manchester [+],
gets [+],
found [+],
fork bomb [+],
fork [+],
floors [+],
fleet [+],
flame [+],
finished [+],
file [+],
feng xue [+],
feds [+],
fawkes [+],
exposed [+],
exploit [+],
engines [+],
energy sector [+],
eldon sprickerhoff [+],
eldon [+],
developements [+],
demonstrates [+],
defcon 1 [+],
cop [+],
convicted [+],
control customers [+],
confirms [+],
conficker [+],
conference [+],
complete security [+],
card [+],
cant block [+],
can screw [+],
calling [+],
callin [+],
bug [+],
bomb [+],
bloke [+],
blogger [+],
behaviour [+],
bank transactions [+],
back [+],
automated [+],
audio windows [+],
attacking [+],
attack [+],
arrest [+],
anti virus software [+],
anonymous [+],
annual [+],
android [+],
amp [+],
air drone [+],
a mole [+],
Software [+],
anti [+],
sophos [+]
-
-
17:00
»
SecuriTeam
Barracuda Spam & Virus WAF 600 is prone to multiple unspecified HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
-
-
12:35
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
12:35
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
-
21:37
»
SecDocs
Authors:
Peter Eisentraut Tags:
virus spam Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.
-
-
17:00
»
SecuriTeam
Dr. Web Anti-Virus for Android is prone to an information-disclosure vulnerability.
-
-
21:27
»
SecDocs
Tags:
malware virus Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The listeners will be introduced in the world of virus coding. They will understand how this can be seen as a way of expressing yourself and why it is a way of hacking. Furthermore they will get to know, which important groups, authors and viruses have been there in the last years and which are still active nowadays. Important technical terms will be explained as well as trends of the last years and the future. And more.
-
-
16:51
»
Packet Storm Security Advisories
Many different AntiVirus products suffer from various file-parsing evasion vulnerabilities. Some of the affected pieces of software include AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, and Panda 10.0.
-
16:51
»
Packet Storm Security Recent Files
Many different AntiVirus products suffer from various file-parsing evasion vulnerabilities. Some of the affected pieces of software include AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, and Panda 10.0.
-
16:51
»
Packet Storm Security Misc. Files
Many different AntiVirus products suffer from various file-parsing evasion vulnerabilities. Some of the affected pieces of software include AhnLab-V3 2011.01.18.00, BitDefender 7.2, CAT-QuickHeal 11.00, Command 5.2.11.5, Comodo 7424, eSafe 7.0.17.0, F-Prot 4.6.2.117, F-Secure 9.0.16160.0, Ikarus T3.1.1.97.0, Jiangmin 13.0.900, Kaspersky 7.0.0.125, Norman 6.06.12, Sophos 4.61.0, Symantec 20101.3.0.103, McAfee 5.400.0.1158, Norman 6.06.12, nProtect 2011-01-17.01, and Panda 10.0.
-
-
15:28
»
Packet Storm Security Recent Files
Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.
-
15:28
»
Packet Storm Security Misc. Files
Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.
-
-
15:00
»
Sophos security news
Sophos Anti-Virus Now Protects BlockMaster SafeConsoleReady Managed Secure USB Drives
-
-
15:00
»
Sophos security news
Anti-Virus software for Mac delivers complete security and support for business and home users of popular Mac operating systems
-
-
7:50
»
Packet Storm Security Recent Files
Whitepaper called Fake Malware and Virus Scanners. Rogue security software reports a virus infection, even if your computer is clean. This kind of "software" could also fail to report viruses when your computer is infected. This document show what are the mechanisms to obfuscate this process.
-
-
10:00
»
Hack a Day
When a new virus or other piece of malware is identified, security researchers attempt to get a hold of the infection toolkit used by malicious users, and then apply this infection into a specially controlled environment in order to study how the virus spreads and communicates. Normally, these toolkits also include some sort of management [...]
-
-
3:26
»
Sophos product advisories
Version 4.59 of the virus data files, scheduled for release in November 2010, will be a large update, possibly up to 45 MB. This update will apply to all Sophos Anti-Virus customers.
-
-
5:36
»
SecDocs
Authors:
Jason Ross Tags:
malware malware analysis Event:
Black Hat DC 2010 Abstract: Your organization has Anti-Virus deployed and is logging virus activity to a central location. Your IDS is watching the perimeter, and you have your systems on a regular patch cycle. Malware doesn't affect you, right? Wrong. This presentation shows where these technologies are falling short and why malware analysis is quickly becoming a need for companies other than Anti Virus vendors. We'll discuss the pros and cons to virtual machines and bare metal as they apply to the purpose of analyzing malicious software.
-
5:36
»
SecDocs
Authors:
Jason Ross Tags:
malware malware analysis Event:
Black Hat DC 2010 Abstract: Your organization has Anti-Virus deployed and is logging virus activity to a central location. Your IDS is watching the perimeter, and you have your systems on a regular patch cycle. Malware doesn't affect you, right? Wrong. This presentation shows where these technologies are falling short and why malware analysis is quickly becoming a need for companies other than Anti Virus vendors. We'll discuss the pros and cons to virtual machines and bare metal as they apply to the purpose of analyzing malicious software.
-
-
11:48
»
Sophos product advisories
This article explains what to do if you have one or more Linux computers updating from another Linux computer's local cache.
Known to apply to the following Sophos products and versions: Sophos Anti-Virus for Linux 7.1.0
-
-
6:24
»
Sophos product advisories
In the software maintenance update, due for release in May, Sophos Anti-Virus for Linux will automatically upgrade from version 6.7 to version 7.1.
-
-
3:52
»
Sophos product advisories
We are incorporating a new driver into the June update of Sophos Anti-Virus, v 7.6.20. (The June update is released in late May 2010.) This will be an automatic update for Endpoint Security and Control customers, and will include a new driver and fixes for several outstanding issues. For this update to take effect, you will need to reboot endpoint computers.