The Latest in IT Security

Posts Tagged ‘configuration files’

Trend Micro has found that some cyber-attacks rely on maliciously crafted JPEG files to perform updates on themselves or to deploy new threats. The image files contain encrypted data that the company researchers managed to extract and thus analyze the content, which consists in configuration files and binaries. Tracked to websites located in the Asia-Pacific […]

Read more ...

Banking Trojans traditionally use configuration files that have been stored on the computer being attacked. These configuration files contain the addresses of the compromised websites, and the code, called the Webinject, which they are seeking to add to these websites via the banking Trojans. This code is then responsible for stealing access data and personal […]

Read more ...

Backdoor Simda is known for about 3 years. Recently a new major outbreak occurred. The new variant of the backdoor is downloaded from certain sites containing video. The frames in the video propose to download new version of Flash Player able to play a movie in newer flash format. The backdoor executable is downloaded and […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments