Get a Pentest and security assessment of your IT network.

News

Black Hat Europe 2015: The Best Response

This trio of Black Hat Europe 2015 Briefings grapple with different aspects of the art of intelligent counter-intelligence. The Domain Name System that makes the web so human-friendly is highly dynamic and continually changing. Microsoft’s Application Compatibility Toolkit can be leveraged to achieve persistence and privilege escalation via Shim Database Files. Linux’s increasing ubiquity, particularly in embedded applications, unfortunately makes it more attractive to malware authors. As such, researchers need better tools to analyze rogue programs. That’s where Limon comes in.”]

Source: https://www.darkreading.com/black-hat/black-hat-europe-2015-the-best-response/d/d-id/1322538

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks