The Latest in IT Security

Posts Tagged ‘unicode character’

?I have mentioned in a previous blog that the use of the right-to-left-override (U+202E) unicode character is nothing new. This blog also went on to show the various file name tricks used by malware. But now we see something different: the use of this trick by variants of the Sirefef family of malware. The variants use […]

Read more ...

Social engineering tactics are vast and varied, and we see all sorts of methods being used on a daily basis by malware authors, in their attempts to compromise your machine. One such method that we see often is malware being distributed as an alluring or enticing link or file, and we know that some users […]

Read more ...

We have seen malware that infects executables operate so that the malicious code runs first, and is then followed by the execution of host file. The malware XDocCrypt takes this a step further. Besides infecting portable executable files, it also infects Microsoft Word and Excel files. In an infected file, the malware body sits at […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments