Search
Thursday, September 20, 2018

Gaining Access

16

May

2017

EC-Council Issues WannaCry Briefing

Author: ExWeeto

As you undoubtedly know, the WannaCry/WannaCrypt ransomware attack has spread throughout the world. Some reports indicate the attack has been slowed but there are fears we haven’t seen the last of the damage.

EC-Council has issued an updated briefing on standard precautions you and your organizations can take to protect your systems. Please do your research as situations vary.

Comments (0) Number of views (0)

21

Sep

2015

10+ Things you Should Know about Rootkits

Author: Exweeto

Malware-based rootkits fuel a multibillion dollar spyware industry by stealing individual or corporate financial information. If that weren't bad enough, rootkit-based botnets generate untold amounts of spam. Here's a look at what rootkits are and what to do about them. Topics include:

  1. What is a rootkit?
  2. Why use a rootkit?
  3. How do rootkits propagate?
  4. User-mode rootkits
  5. Kernel-mode rootkits
  6. Hybrid rootkits
  7. Firmware rootkits
  8. Virtual rootkits
  9. Generic symptoms of rootkit infestation
  10. Polymorphism
  11. Detection and removal

[Note: this links to an external article]

Comments (0) Number of views (0)

“If I had eight hours to chop down a tree, I'd spend the first six of them sharpening my axe.”

Abraham Lincoln

Copyright 2018 by Exweeto Terms Of Use Privacy Statement