Keyword: unauthorized file encryption
92237 Total Search   |   Showing Results : 1501 - 1520
.dvd .fcd .flp .img .isz .mdf .mds .nrg .nri .vcd .vhd .snp .bkf .ade .adpb .dic .cch .ctt .dal .ddc .ddcx .dex .dif .dii .itdb .itl .kmz .lcd .lcf .mbx .mdn .odf NOTES: It exempts encryption of files in
What would you do when you receive a confidential file from an administrator? Will you open it? Will you take the risk? Several spammed messages coming from administrator and labeled as confidential
The social engineering tactic may be old, but the use of a malicious .PDF file that leverages an inherent Adobe Reader and Acrobat feature makes this threat noteworthy. What happens in this attack?
XPM file that triggers a heap-based buffer overflow. Sun OpenOffice.org 2.0.3,Sun OpenOffice.org 2.0.0,Sun OpenOffice.org 2.1.0,Sun OpenOffice.org 2.2.0,Sun OpenOffice.org 2.2.1,Sun OpenOffice.org
CVE-2010-3232 Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and
?device=disk, a variant of CVE-2008-2810. mozilla firefox 3.0.2,mozilla firefox 3.0.3 Apply associated Trend Micro DPI Rules. 1003041| 1003041 - Mozilla Firefox .url Shortcut File Information Disclosure
Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a
are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1002101| 1002101 - Microsoft Excel File
CVE-2008-0112,ms08-014 Unspecified vulnerability in Microsoft Excel 2000 SP3, and Office for Mac 2004 and 2008 allows user-assisted remote attackers to execute arbitrary code via a crafted .SLK file
CVE-2008-0109 Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information
It locks the screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1
Server Information Disclosure Vulnerability (CVE-2019-1225) Mail Client Miscellaneous 1001206* - IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflows 1001174* - IPSwitch IMail Client MIME
This Trojan may be downloaded by other malware/grayware from remote sites. It downloads a file from a certain URL then renames it before storing it in the affected system. It executes the downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. It avoids encrypting
vssadmin.exe It deletes itself as well as its LNK startup after the user chooses to reboot the system It locks the screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT
following: It deletes shadow copies using vssadmin.exe It deletes itself as well as its LNK startup after the user chooses to reboot the system It locks the screen after file encryption routine It avoids to
screen after file encryption routine It avoids to encrypt the following files/folders: \WINNT \RECYCLER\ \SYSTEM~1\ \BOOT\ \RECOVERY\ \$RECYCLE.BIN\ \PERFLOGS\ \EFI\ \CONFIG.MSI\ \PROGRA~1\ \PROGRA~2
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes registry entries, causing some
Variants also perform web injection—inserting additional HTML forms—to get additional information. Stolen login credentials are used to initiate unauthorized transactions like online fund transfers. The