Yearly Archives: 2013

Image Hosted on Web Server Serving Malware

Security researchers at TrenMicro have identified a new type of malware that update their configuration in a very interesting way. This means that compromised machines are configured to download JPEG files that contain encrypted configuration files/binaries without victim’s knowledge. The

Raise Windows privileges with physical access

There is several linux distributions that allows to crack windows operating system administrator passwords. BIOS password is important to prevent such attack as if the attacker have physical access to the host he will be able to have admin access

Process Hacker 2.32 – Utility to manage Windows process and services

Process hacker is one of the leading tool for manipulating processes and services, this is important for monitoring the changes when you are investigating a malicious code. you will need this tool in your sandbox to identify any new process

Linkedin Klepto – Social Engineering Tool for LinkedIn

During a penetration testing it is important to conduct a company profiling, search online for information available on social networks like Facebook, Twitter, Google+, and LinkedIn that will help to find the system used by the company. On internet there

AutoCAD Malware Open Security Gaps on Infected Systems

Security researchers at TrendMicro alerting AutoCAD users about new malware that takes .FAS form and open victim computers to attack. The malware is known as ACM_SHENZ.A and creates administrator privilege account that allows attacker to have a full control on

EncryptOnClick – Encrypt and protect your sensitive files

We store and share a lot of information and data that may contain sensitive content, using a solid encryption tool is very important to protect all your activity. EncryptOnClick  is a free application that allows to quickly encrypt files with

Voice E-mail Spam Leads to Blackhole and Zbot Malware

Security researchers at TrendMicro reported a new spamming campaign that is spreading the Blackhole Exploit Kit. The emails are attaching a zipped file that contains a downloader to install Zbot and take control of victim machines. Cyber criminal are combining