Readers like you help support my blog. When you make a purchase using links on our site, we may earn an affiliate commission! Thank you!

Saturday, March 21, 2015

Scrutiny from an Inquisitive mind: Defeating EMET 5.2

Scrutiny from an Inquisitive mind: Defeating EMET 5.2: Since my last post, i thought if Malware Bytes Anti Exploit can be bypassed in a targetted attack why not work on bypassing EMET using rop ...

Friday, March 20, 2015

Thursday, March 19, 2015

Wednesday, March 18, 2015

Jump ESP, jump!: Thousand ways to backdoor a Windows domain (forest...

Jump ESP, jump!: Thousand ways to backdoor a Windows domain (forest...: When the Kerberos elevation of privilege (CVE-2014-6324 / MS14-068) vulnerability has been made public, the remediation paragraph of follo...

Dynamoo's Blog: Malware spam: "December unpaid invoice notificatio...

Dynamoo's Blog: Malware spam: "December unpaid invoice notificatio...: This spam comes with no body text, but does come with a malicious attachment. From :    Korey Mack Date :    18 March 2015 at 11:04 ...

Friday, March 13, 2015

Malware Battle: 750,000 Computers Infected With Malware In Belgium...

Malware Battle: 750,000 Computers Infected With Malware In Belgium...: In the first half of 2014 were 750,000 computers infected with malware and Belgium were part of one or several botnets, according to figu...

Friday, January 30, 2015

Google Lat Long: Google Earth Pro is now free

Google Lat Long: Google Earth Pro is now free: Over the last 10 years, businesses, scientists and hobbyists from all over the world have been using Google Earth Pro for everything from...

Tuesday, January 20, 2015

Blaze's Security Blog: Ransomware: a Q&A

Blaze's Security Blog: Ransomware: a Q&A: Ransomware A Q&A written by @bartblaze   Who creates them? What is their goal? How successful are they, and what is their recipe f...

Friday, January 16, 2015

Friday, January 9, 2015

Monday, December 22, 2014