News
Using legitimate tools to hide malicious code
malicious code malware Using legitimate tools to hide malicious code

Using legitimate tools to hide malicious code By Anatoly Kazantsev The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of hiding malicious code in the context of a trusted process. Typically, malware that uses concealment techniques injects its code into a system process, e.g. explorer.exe. But some samples employ other interesting methods. We’re going to discuss one such type of malware. Our eye was caught by various samples for .NET that use the trusted application InstallUtil.exe from the Microsoft .NET Framework (information from Microsoft’s website: “The Installer...
Can airlines and airports use 'smart contracts' for shared control of data?
airlines airlines and airports use 'smart contracts' for shared control of data airports smart contracts

Can airlines and airports use 'smart contracts' for shared control of data? 08 November 2017 SITA Lab publishes research findings SITA Lab, the research team of the air transport industry’s IT provider SITA, today revealed the learnings from research it carried out with British Airways, Heathrow, Geneva Airport and Miami International Airport into ‘smart contracts’ residing on a blockchain. Blockchain has been heralded as a transformational technology for many industries. While several use cases have been identified for the air transport industry, the opportunity of using ‘smart contracts’ for shared control of data by airlines and airports is one which...