skip to main | skip to sidebar

Counter-Interference Force

Security ... think about it!

I should be able to resume posting shortly.

Video: Three Natural Laws of Security is currently unavailable. Seeking new hosting site.

2010-05-17

Last week, researchers at Matousec.com outlined how attackers could exploit the kernel driver hooks that most security software use to reroute Windows system calls through their software to check for potential malicious code before it's able to execute. Calling the technique an "argument-switch attack," a Matousec-written paper spelled out in relatively specific terms how an attacker could swap out benign code for malicious code between the moments when the security software issues a green light and the code actually executes.
Posted by rlssec
Newer Post Older Post Home

Video

  • Three Natural Laws of Security

Free Computer Security Measures

  • List of (mostly) free tools (some dangerous if misused)
  • Zone Alarm Firewall
  • Hushmail
  • Eraser
  • CrapCleaner - MRU Eraser
  • Spybot S&D via Download.com
  • Avira Free Personal Anti-virus

Blog Archive

  • ►  2012 (130)
    • February (63)
    • January (67)
  • ►  2011 (721)
    • December (46)
    • November (30)
    • October (50)
    • September (55)
    • August (7)
    • July (53)
    • June (69)
    • May (73)
    • April (70)
    • March (101)
    • February (58)
    • January (109)
  • ▼  2010 (1371)
    • December (133)
    • November (127)
    • October (83)
    • September (87)
    • August (79)
    • July (33)
    • June (71)
    • May (149)
    • April (158)
    • March (169)
    • February (143)
    • January (139)
  • ►  2009 (1213)
    • December (120)
    • November (146)
    • October (149)
    • September (67)
    • August (82)
    • July (119)
    • June (118)
    • May (184)
    • April (228)