Official CERT website for the Republic of Uganda
The ZeroAccess botnet has been spreading by catching fire onto computers during the Adobe Flash download process. The malware slides in under the radar and remains undetected by antivirus programs. The ZeroAccess infection vector is just one example of malicious files that can go undetected.
Microsoft has released 11 Security Bulletins to address at least two dozen flaws in its products. Five of these bulletins address the critical flaws, two of which are being actively exploited.
Determining when if a file, binary or script has been maliciously crafted isn't a simple task although traditionally security organisations have discovered and identified malicious code, blocked it from executing to harm the companies software and systems or even resorted to using whitelisting to enable the trusted appicalication to run only.
Managing resilience for cyber systems requires metrics that reflect the relationship as among system components in physical, information, cognitive and social domains.
Abstract: It is essential for businesses to understand the risks and what particular aspects they are responsible for inorder to be successful. As Cyber Monday is looming, more holiday shoppers than ever will buy online, skipping the crowds and snapping up last minute deals and free shipping.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. (Follow link)
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.