The Latest in IT Security

Posts Tagged ‘static analysis’

A new threat for the Linux platform was first mentioned on August 7th by RSA researchers, where it was dubbed Hand of Thief.  The two main capabilities of this Trojan are form-grabbing of Linux-specific browsers and entering a victim’s computer by a back-door. Moreover, it is empowered with features like anti-virtualization and anti-monitoring. With the […]

Read more ...

Last week I kicked off a series of blogs with a discussion of how an effective IPS solution can fight obfuscation techniques by malware. This week, we’ll look at how JavaScript poses a danger when combined with PDF files.One of the easiest and most powerful ways to customize PDF files is by using JavaScript. JavaScript […]

Read more ...

05
Dec
2012

Malware Analyst Posted: 10 December 2010 Company name: G Data Software AG Location: Bochum Germany Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:JOB DESCRIPTION GData Software AG is looking for Malware Analysts who want to work with a cutting edge team in a company that is rated […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments