Discovering who is behind a computer-based attack is hard because you don’t know which clues are real and which have been planted as misinformation. When well-resourced entities are thought to be behind an attack campaign the sky is the limit…
Category: Threats
Were You Asking For It?
Should internet users take more responsibility? I’m just taking a break from testing anti-spyware software using the new lab, and I found an interesting article by Didier Stevens, who has set up a Google advert that offers to infect your system with…
Vista Security Bypassed
Bootkit gives complete control SecurityFocus has published an interview with two Indian graduates who claim to have developed a new way of attacking Windows Vista. Essentially, they have found a way to introduce potentially harmful program code to a Vista PC. They bypass…