The Latest in IT Security

Posts Tagged ‘network traffic analysis’

Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other “tricks”. However, hiding the network traffic – specifically from monitoring outside an infected computer – is not an easy task, but is something that the botnet creators have […]

Read more ...

Sr. Malware Researcher Posted: 9 May 2012 Company name: FireEye Location: Milpitas CA United States Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:*Perform leading edge malware research, analysis (data-mining) and generate content for use in our products *Enhance FireEye’s security content infrastructure, process workflow, and the malware […]

Read more ...

Our analysis, “TDL4 – Top Bot” by Sergey Golovanov and Igor Soumenkov, has rightly been getting a lot of attention. It’s an excellent analytical article which uncovers a very sophisticated and complex malware TDL-4 which is the latest version of TDSS. Some commentators and other security researchers however, focusing on our use of the word […]

Read more ...


TUESDAY, JULY 17, 2018



Latest Comments

Social Networks