Articles on Malware
- Incident Response 9 Reasons for Denial-Of-Service (DoS) Attacks: Why Do They Happen? DoS attacks happen for many reasons: extortion demands, turf wars between criminal groups, anticompetitive sabotage, punishment for refusing demands, political criticism, training grounds for future...
- Tools Using ICMP Reverse Shell to Remotely Control a Host ICMP can create covert command-and-control channels that cross many firewalls since organizations often allow ping traffic. The icmpsh tool demonstrates this—a Windows victim issues ICMP echo-request...
- Tools Controlling Adobe Acrobat/Reader JavaScript Support Disabling JavaScript in Adobe Acrobat/Reader renders many PDF exploits ineffective. If full disabling isn't practical, Adobe's JavaScript Blacklist Framework lets users selectively disable risky API...
- Social Networking Explaining Computer Security Terms to Ordinary People Technical jargon that security professionals use daily may be meaningless to non-IT people. A collaborative effort with SANS Institute defines commonly-used security terms like firewall, exploit, and...
- Malware 5 Events in 2011 That Challenged Online Security and Trust Assumptions
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...