The Latest in IT Security

Posts Tagged ‘application data’

Over the past number of days, we have received feedback from customers that the number of Trojan.Exprez.B detections in Spanish regions has been steadily increasing. Trojan.Exprez.B is a file infector that replaces .exe, .doc, and .docx files on a compromised computer with a copy of itself. This copy of the Trojan also contains the original […]

Read more ...

In the June ’12 installment of the Microsoft Malicious Software Removal Tool (MSRT), we take on two threat families – Win32/Kuluoz and Win32/Cleaman. This post includes information about Kuluoz as we’ll discuss Cleaman later this month. Win32/Kuluoz is a multi-component trojan family that that attempts to steal passwords that are stored in certain applications, and […]

Read more ...

SophosLabs has been monitoring a new strain of the infamous ZeroAccess rootkit that has been hitting the internet over the last few weeks.ZeroAccess is a sophisticated kernel-mode rootkit that enslaves victim PCs, adding them to a peer-to-peer botnet from which they receive commands to download other malware. The rootkit has undergone several revisions since its […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments