Google Chrome: How to Bypass Secure Preferences
Google Chrome protects its user preferences using a hashing mechanism. However, there’s a way to bypass this, and it’s quite used by malware in the wild.
DetailsGoogle Chrome protects its user preferences using a hashing mechanism. However, there’s a way to bypass this, and it’s quite used by malware in the wild.
DetailsFileless malware has always been popular and widely covered (Example: Poweliks). Study of a fileless malware stored in the task scheduler.
DetailsYou’ve all seen Facebook posts shared by your friends with attractive titles, waiting for you to click. We’ve clicked for you, and you will be deceived.
DetailsDiscover the inner working of the places where transactions between exploits dealers take place and the conditions of such transactions.
DetailsDiscover exploitation methods, exploits development and inner workings and learn about the countermeasures that exists to protect your infrastructure.
DetailsExploits and Exploit kits play a major role in the spread of malware. Learn how they work and how to protect yourself from such threats.
DetailsAnalysis of the Carberp bootkit capabilities to hide into the system, and self protect its components with a filter driver.
DetailsCarberp Anti Rapport Trusteer – How the Carberp malware is defeating Anti Rapport (from Trusteer) to gain access to the bank account of a victim.
Details