Posts Tagged ‘DoS-attacks’

Microsoft WordVulnerability: buffer overflow in Microsoft Word

Vulnerability allows an attacker to carry out DoS attacks, and compromise a vulnerable system.

Member organizations Inj3ct0r hacker under the alias coolkaveh discovered a buffer overflow vulnerability in the stack in Microsoft Office Word 2010. The vulnerability allows an attacker to cause a denial of service or compromise a vulnerable system. (more…)

Computer VirusesBrute force attacks – the so-called attack by the “brute force”. Typically, users use simple passwords, such as “123”, “admin”, etc. These and enjoy computer hackers, who with the help of special calculates the Trojans to penetrate the network password brute – based embedded in the program password dictionary or generate a random sequence of characters.

Keyloggers – kind of Trojans, whose main function is to capture user input via the keyboard. The objects of the abduction are personal and network passwords, logins, credit card details and other personal information.

Backdoors – programs that provide input into the system or receiving the privileged function (mode), bypassing the existing system of authority. Often used to circumvent existing security system. Hatches do not infect files, but registers itself in the registry, thus modifying the registry keys. (more…)