The Latest in IT Security

Posts Tagged ‘accesses’

If you’re on the lookout for Android USB drivers for your Windows OS, be very careful. Such strings like “Windows Android Drivers” or combinations of these may bring up results that you would rather stay away from. Our researchers in the AV Labs have found this peculiar search result on Yahoo!: click to enlarge Visiting […]

Read more ...

A new vulnerability has been found in Internet Explorer that affects Internet Explorer 6, 7, 8 and 9. The vulnerability allows attackers to execute code on a machine by just having a user visit a malicious website which can happen for example by tricking the user to click on a link in an email or […]

Read more ...

Symantec recently received a new sample of Backdoor.Korplug that signs itself with a stolen certificate. It also made use of legitimate software, but this time there is something different from what was revealed in our previous blog entry.Figure 1. Loading sequenceFrom the data we have seen, the original executable was most likely signed by NVIDIA. […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments