Archives - Malicious Code


How is ransomware delivered?

Ransomware is commonly delivered through phishing emails or via “drive-by downloads.” Phishing emails often appear as though they have been sent from a legitimate organization or someone known to the victim and entice the user to click on a malicious link or open a malicious attachment. A “drive-by download” is a program that is automatically […]

Disable external media AutoRun and AutoPlay features

Disabling AutoRun and AutoPlay features prevents external media infected with malicious code from automatically running on your computer.

What’s the relation between the ‘Turla’ worm and the U.S. Army most serious computing hack in histo…

In 2008, a very powerful variant of the infamous ‘Agent’ worm hit local computing networks of the U.S. Army central command in the Middle East. It was classified as the worst computing hack in the history of the U.S. Army. Pentagon experts took 14 months to completely remove the malware from the military network. That […]

New Zero-Day Attack in Adobe Products (CVE-2011-2462)

Recently, Adobe has released a new security advisory, APSA11-04, alerting users about a critical vulnerability in Adobe Reader and Acrobat. The U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. This means that the malicious files could be downloaded or dropped on the […]