Software Vulnerabilities March 3, 2014 Rising Use of Malicious Java Code for Enterprise Infiltration 4 min read - Fifty percent of the exploits observed by Trusteer and IBM X-Force Research in December 2013 targeted Java vulnerabilities.
X-Force March 3, 2014 The State of Return Oriented Programming in Contemporary Exploits 6 min read - Return Oriented Programming (ROP) is the general case of a technique often used when exploiting security vulnerabilities caused by memory corruption issues. ROP has become a more frequently used technique in the exploitation of memory corruption vulnerabilities.
Malware September 12, 2013 Fake News: Syrian Crisis News Used to Spread Information-Stealing Malware 2 min read - Emails advertising fake news about the crisis in Syria are spreading information-stealing malware to those who click on them.
Advanced Threats May 2, 2013 Multistage Exploit Kits Boost Effective Malware Delivery 6 min read - Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.
Malware April 22, 2013 Twitter Malware: Spreading More Than Just Ideas 3 min read - With hundreds of millions of users, Twitter is one of the largest social networks, so it's no surprise that Twitter malware attacks are on the rise.