The Latest in IT Security

Posts Tagged ‘existence’

A new zero-day exploit in Java has been found in the wild. Currently, this exploit is being used by toolkits like the Blackhole Exploit Kit (BHEK) and the Cool Exploit Kit (CEK).CEK is the creation of the same author responsible for Blackhole Exploit Kit. It appears to be a high-end version of the more accessible BHEK. Zero-day […]

Read more ...

Iran CERT recently announced that it uncovered a possible targeted attack using a malware that wipes files that will run on certain predefined time frame. They noted its efficiency in performing its routines despite its simplistic design.The way this malware was created was also deemed unusual, as the author wrote a series of batch files […]

Read more ...

In the first half of October, an upsurge in Trojan encoders occurred, with a significant number of aid requests coming from users whose files were compromised by such programs. October also saw an increased bulk of e-mails spreading Trojan.Necurs.97, and an attempt to distribute another piece of malware via Skype. Viruses Various Trojan.Mayachok modifications lead […]

Read more ...

Categories

MONDAY, JULY 23, 2018

Featured

Archives

Latest Comments

Social Networks