The Latest in IT Security

Posts Tagged ‘html files’

We are monitoring a spam campaign that is using the names of delivery services like FedEx and DHL to send the receiver to a website that installs malware. With subjects like “Not possible to make delivery” or “Shipping service”, the emails make heavy use of social engineering by creating a sense of emergency in order […]

Read more ...

When developers are unaware of security they open the door to threats against their customers and users. We are not just talking about exploitable vulnerabilities in their code, but about something much more obvious than that. Here is the curious case of an Android application on Google Play that contains some traces of malware, but […]

Read more ...

ObfuscationsIn my previous blog, I discussed some stealth techniques Java.Cogyeka uses. These stealth techniques are not effective at deceiving users or security researchers, but their use proves that Java malware is continuously improving.Aside from the stealth techniques, Java.Cogyeka is designed to evade security researchers through various obfuscation techniques. Some are effective, some are overdone. Overdone […]

Read more ...

Categories

TUESDAY, JULY 17, 2018

Featured

Archives

Latest Comments

Social Networks