The Latest in IT Security

Operating Shylock Trojan Was a Full-Time Job

11
Jul
2014

The group behind the Shylock/Caphaw banking Trojan showed their business prowess for the full duration of the operation, by carefully selecting their market, protecting the asset from authorities through detection evasion tactics, and optimizing it for a higher rate of success. This week, the U.K. National Crime Agency coordinated an international effort to take control of the domains used for communication with the machines infected by the banking malware. Among the partners in the operation…

Tags:  
Comments are closed.

Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments