<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d26473280\x26blogName\x3dHackers+News\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLACK\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://hackers-news.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://hackers-news.blogspot.com/\x26vt\x3d113306571398039483', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Hackers News

Keeping Knowledge Free

Beware the silent exploit

An interesting stat in the ninth and latest version of Symantec’s bi-annual Internet Security Threat Report, which covers the second half of 2005, highlighted the rise in exploits that are modular in nature. Modular malicious codes, as Symantec calls them, are exploits that initially possess limited functionality but over time are capable of updating themselves into sophisticated malware. As Symantec’s report showed, modular is now the mantra for hackers: Malicious modular code accounts for nearly 88 percent of the top 50 malicious code samples between June to December 2005, up from 77 percent in the previous six-month period. The obvious inference from the stat is that more hackers now think stealth and non-destructiveness when they launch attacks. Modular exploits, being tiny in footprint and light on resource requirement, lets hackers go under the radar while they steal data and slave machines.

read more
« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »

» Post a Comment