BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for September, 2010

DLL Hijacking Assessment & Mitigation

There has been a lot of discussion lately about the older, but newly rediscovered, DLL Hijacking vulnerability. If you are not already familiar with this vulnerability, it allows for system compromise across an unknown number of applications. Specifically, the vulnerability takes advantage of the process of how Microsoft Windows applications load DLL (Dynamic-Link Library) files,…

Post by Marc Maiffret September 3, 2010
Tags:

The Retina Protection Agent

Traditional anti-virus solutions that rely on blacklisting malware are insufficient to protect today’s systems from the plethora of threats. Security vendors have evolved endpoint protection solutions to include firewalls, host-based intrusion prevention solutions, and even proactive application protection capabilities in order to defend against the evolving threat landscape. Unfortunately, many businesses still rely on anti-virus…

Post by Morey Haber September 2, 2010
Tags:
, , , , , , , , , ,