Rodney Campbell's Blog

2006.11.28 Daily Security Reading

by on Nov.28, 2006, under Security

Introducing Stealth Malware Taxonomy (pdf)

Joanna Rutkowska proposes a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system.

Copyright Office publishes digital exemptions

To hack the security preventing interoperability of wireless phones… to reverse engineer the digital rights management on audio CDs for security testing.

Filtering out the hype

Corporate email is vulnerable to attack from the increasingly sophisticated and ever-growing number of viruses, spam, spyware and phishing technologies out there. And vulnerable to abuse from within, which could result in: acceptable use policies being compromised; regulatory compliance violations; and/or confidential corporate data being leaked externally.

Devastating mobile attack under spotlight

All mobile phones may be open to a simple but devastating attack that enables a third-party to eavesdrop on any phone conversation, receive any and all SMS messages, and download the phone’s address book.

Apple Mac OS X Mach-O Binary Loading Integer Overflow Vulnerability

Apple Mac OS X is prone to a local integer-overflow vulnerability. This issue occurs when the operating system fails to handle specially crafted binaries.


Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.