The Latest in IT Security

Posts Tagged ‘dummy files’

For quite some time, we have observed the technique of server-side polymorphism being used to infect Windows computers around the world. What this means is that every time a file is downloaded, a unique version of the file is created in order to evade traditional signature-based detection. We are now seeing this same technique being […]

Read more ...

02
Nov
2011

Hey look, a new Batman game. Would it surprise anybody to find Ye Olde Scam Sites touting fake Downloadable Content Generators that want you to fill in a survey before downloading them? Not really, but here’s a site claiming to give away free “Play as Robin” codes anyway located at robincharacterdlcfree(dot)info.  Click to Enlarge As with […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments