- Mar 2024
-
www.theregister.com www.theregister.com
-
Next to the xz debacle where a maintainer was psyops'd into backdooring servers, this is another new attack surface: AI tools make up software packages in what they generate which get downloaded. So introducing malware is a matter of creating malicious packages named the way they are repeatedly named by AI tools.
-
- Oct 2023
-
www.youtube.com www.youtube.com
-
"Without the right to tinker and explore, we risk becoming enslaved by technology; and the more we exercise the right to hack, the harder it will be to take that right away" - Andre "Bunnie" Huang
hah, we are already "enslaved by technology". ask Ted Kaczynski
our enemies already have hardware backdoors, compromising emissions (tempest), closed-source firmware/drivers/hardware, ... but sure, "feel free"
Tags
Annotators
URL
-
- Jan 2023
-
-
OpenEDR and portal 제공 comodo internet security Docker
Tags
Annotators
URL
-
- Mar 2022
-
-
Can we get hacked by visiting an infected website? Unfortunately, we can always be hacked when visiting an infected website. Due to the existence of a number of vulnerabilities on the web, visiting websites has always been dangerous over the years. Moreover, with the advent of JavaScript, infecting with a malicious virus became easier.
-
- Jun 2020
-
-
Wyróżniamy 2 podstawowe metody wykrywania malware(można mówić o większej ilości, jednak na potrzeby przybliżenia podstaw wspomnę tylko o dwóch):
2 ways antiviruses detect malware:
- Signature-Based Detection - based on signatures (known byte sequences) updated continuously. For example, the method deletes software immediately after it's downloaded
- Heuristic and Behavioral-Based Detection - based on malware's "behaviour" (each of its instructions)
-
- May 2020
-
www.google.com www.google.com
Tags
Annotators
URL
-
-
-
I do not understand what is the threat model of not allowing the root user to configure Firefox, since malware could just replace the entire Firefox binary.
-
- Apr 2020
-
www.charliechurchmouse.com www.charliechurchmouse.com
-
Guaranteed Spyware Free
Tags
Annotators
URL
-
- Mar 2020
-
-
Advertisements are often injected with malware.
-
- Feb 2020
-
en.wikipedia.org en.wikipedia.org
-
With version 6.1.4, the Foxit installer was bundled with potentially unwanted programs like OpenCandy which installed the browser-hijacking malware Conduit.[11][12] Following complaints from users, it was removed after version 6.2.1.[13] In July 2014, the Internet Storm Center reported that the mobile version for iPhone was transmitting unencrypted telemetry and other data to remote servers located in China despite users attempting to opt out of such data collection.[14]
-
- Jun 2016
-
www.onthewire.io www.onthewire.io
-
Short primer on ransomware and defenses.
-