Security News

Macro-based malware evolves to bypass traditional defenses (Help Net Security)
2016-09-12 17:03

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based malware: The past Malware...

Latest Windows UAC Bypass Permits Code Execution (Threatpost)
2016-08-15 19:35

Researcher Matt Nelson disclosed another Windows UAC bypass that makes use of Event Viewer to hijack registry entries and run code.

Malware hidden in digitally signed executables can bypass AV protection (Help Net Security)
2016-08-08 21:43

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code – all without triggering AV solutions....

Researchers Bypass Chip-and-Pin Protections at Black Hat (Threatpost)
2016-08-04 02:29

Researchers demonstrated how they can capture both Track 2 data and bypass chip and pin protections with a Raspberry Pi and infected pin pads at Black Hat.

UAC bypass attack on Windows 10 allows malicious DLL loading (Help Net Security)
2016-07-26 16:01

Security researchers Matt Graeber and Matt Nelson have discovered a way to run a malicious DLL on Windows 10 without the User Account Control (UAC) springing into action and alerting users of the...