Security firm IOActive reports that attackers could create a fake certificate authority to sign executables
, allowing malicious software to impersonate as official Lenovo software.
Because the technology does not rely on debug or symbol-table information, it can examine the stripped executables
normally shipped by software vendors.
creates a centralised control list that blocks unauthorised executables
from infecting workstations and servers, or causing system degradation.
lt;/p><p>The companya[euro](tm)s virtual applications can be deployed in standalone executables
and Microsoft Installer (MSI) packages, in private clouds using Spoon Serve, or via the web at http://www.
It confirmed it controls its own whitelist of allowed executables
, while anti-virus and other blacklisting solutions are controlled by a third party.
Imperva announced the ADC Change Management Module for SecureSphere which tracks modifications to external database objects including configurations, executables
, and registry keys.
SGOS' HTTP virus screening tool can quarantine such web-borne spyware executables
to the EdgeForce integrated hard drive.
It comes in an e-mail message with a spoofed "from" field (support@bitdefender) and prompts users to download harmful executables
from the http://playb ago.
The embedded Agent can check the security status of the embedded device including: the status of executables
(antivirus, host firewall, host IDS, sandbox), files (antivirus signatures, host firewall policies, host IPS signatures, MD5 checksum, file version), registry values, versions, patches, and operating system configurations.
It appends itself to executables
on IA64 Windows machines, and also affects 32-bit computers with 64-bit emulators.