General discussion

Locked

Adventures in Security

By tolzak ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

Thread display: Collapse - | Expand +

All Comments

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Application Security: People, Process, and Technology

by tolzak In reply to Adventures in Security

Most organizations have worked feverishly to secure the network infrastructure, including?executing rigorous operating system?patch and configuration management processes.? They’ve done such a good job, attackers are turning to applications as the next avenue of attack.? This includes both?commercial and?proprietary solutions.
In this article, we’ll look at the challenges facing managers as they implement commercial applications and [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=44">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

University of Washington Spyware Study Results

by tolzak In reply to Adventures in Security

In a recent University of Washington?paper (see Sources below), the results of a five month study (May 2005?to October 2005)?of the state of spyware on the Internet were documented.? The following is a summary of the researchers’ conclusions:


In October 2005, the researchers crawled 20 million URLs.? Of that number, 19% contained executable programs.??5.5% of the [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=45">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Related Discussions

Related Forums