exploit techniques

  1. News

    Mitigating arbitrary native code execution in Microsoft Edge

    Some of the most important security features in modern web browsers are those that you never actually see as you browse the web. These security features work behind the scenes to protect you from browser-based vulnerabilities that could be abused by hackers to compromise your device or personal...
  2. News

    Baseball, Bulletins and the February 2013 Release

    Before we discuss this month’s release, I wanted to briefly touch on the big event happening this week. No, I’m not talking about the romantically-themed holiday on Thursday. I’m talking about the start of spring training and the return of baseball. There are a few things I am...
  3. P

    Windows 7 Can virus's inject into legitimate process's ? (One for all you tech wizards out there)

    (This pertains to windows 7) As title really, is it possible for a threat loaded from something like a web page or something else, to inject malicious dll's into existing legitimate windows processes ? And when i say existing processes i mean the processes and type of stuff that most people...
Back
Top