SharePoint Serving the Hacker
Security

SharePoint Serving the Hacker

SharePoint is a corporate document storage system from Microsoft with CMS capabilities which is strongly bound to Active Directory. You can use Google to find general descriptions of its vulnerabilities but, given that the details of its…
CONTINUE READING 🡒
Pwn Plug R2
Security

Pwn Plug R2

Instrumental bugs, radio interception — everyone's heard of these, right? The idea of introducing one's own device into a communication channel that carries important information is as old as the world. Such devices are well-known to everyone…
CONTINUE READING 🡒
Spam with viruses
Malware

Spam with viruses

Spamming with malicious attachments is a popular way of malware spreading and infecting computers of Internet users. According to data of different antivirus companies, the share of messages with malicious attachments makes 3 to 5 percent in…
CONTINUE READING 🡒
Cryptography at gunpoint
Security

Cryptography at gunpoint

Cryptography is perceived as a magic wand waving which one can protect any information system. However, surprisingly enough, cryptographic algorithms can be successfully attacked. All sophisticated cryptanalysis theories will be brought to naught if the smallest piece…
CONTINUE READING 🡒
The Bourne Identity
Security

The Bourne Identity

It is always stressed me out how Google AdSense palm me off with certain contextual advertising based on my previous searches. And it might seem that quite enough amount of time had passed and that all cachees…
CONTINUE READING 🡒
Monetizer Trojans
Malware

Monetizer Trojans

Today, we will leave aside the activities of outright web criminals and talk about the programs which, while being formally not malicious, have some features that get them flagged as "unwanted" by many antivirus tools.
CONTINUE READING 🡒