The Latest in IT Security

Posts Tagged ‘stealth techniques’

ObfuscationsIn my previous blog, I discussed some stealth techniques Java.Cogyeka uses. These stealth techniques are not effective at deceiving users or security researchers, but their use proves that Java malware is continuously improving.Aside from the stealth techniques, Java.Cogyeka is designed to evade security researchers through various obfuscation techniques. Some are effective, some are overdone. Overdone […]

Read more ...

A new Trojan has been discovered –DarkAngle– that steals users’ confirmation information like passwords, banking details, etc. Nothing unusual about this, just one more to add to the more than 73,000 new viruses that appear every day. However, there is something truly special about this new piece of malware… It tries to pass itself off […]

Read more ...

As we see new threats arrive daily employing unique and complex capabilities, it is surprising to find a Swedish bot using a control server that was active in 2009. Generally malware authors keep changing their control servers-especially after reports about them surface-but not in this case. This network belongs to prq.se, which hosts at IP […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments