Anyone read this article on this new AV exploit that researchers discovered?:
http://www.theregister.co.uk/2010/05/07/argument_switch_av_bypass/

http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php

Pretty much every AV vendor failed the exploit as well. 
Sigh, Let's hope this doesn't get into the wild, but with so much detailed info 
on what they did someone will make this a reality. 
-Greg 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to