Home evade
 

Keywords :   


Tag: evade

Hong Kong protesters turn to mesh networks to evade Chinas censorship

2014-09-30 14:29:01| Extremetech

The rather cramped streets of Hong Kong are currently lined with tens of thousands of people -- the Umbrella Revolution. The Chinese government, as always, has blocked and censored a number of social media sites so that mainland China can't see what's going on in Hong Kong. The Hong Kong protesters won't be so easily thwarted, however: They are already using a mesh networking app called FireChat, which allows the protesters to communicate freely without any kind of centralized cellular or WiFi network.

Tags: turn hong kong networks

 

United States Announces $5.15 Billion Settlement Of Litigation Against Subsidiaries Of Anadarko Petroleum Corp. To Remedy Fraudulent Conveyance Designed To Evade Environmental Liabilities

2014-04-14 11:35:45| oilandgasonline News Articles

More Than $4.4 Billion to Be Available for Environmental Clean-up and Claims Largest Payment for the Cleanup of Environmental Contamination in History

Tags: to united states united states

 
 

Microsoft finds Trojan that hides files to evade analysis

2013-04-17 16:49:04| InfoWorld: Top News

Microsoft has discovered an unusually stealthy Trojan capable of deleting files it downloads in order to keep them away from forensics investigators and researchers. The Trojan downloader, called Win32/Nemim.gen!A, is the latest example of how malware writers are using sophisticated techniques to protect their own trade secrets. The Trojan essentially makes downloaded component files irrecoverable, so they cannot be isolated and analyzed.

Tags: analysis files microsoft finds

 

Researchers find APT malware that monitors mouse clicks to evade detection

2013-04-02 17:09:49| InfoWorld: Top News

Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected computer. Called Trojan.APT.BaneChant, the malware is distributed via a Word document rigged with an exploit sent during targeted email attacks. The name of the document translates to "Islamic Jihad.doc."

Tags: find mouse researchers detection

 

Banking malware returns to basics to evade detection

2013-02-08 14:54:46| InfoWorld: Top News

Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan programs used by cyber criminals today are capable of tampering in real time with online banking sessions initiated by victims on their computers. This includes the ability to execute fraudulent transactions in the background and hide them from the user by modifying the account balance and transaction history display in their browser.

Tags: returns banking detection basics

 

Sites : [1] [2] [3]