The Latest in IT Security

Posts Tagged ‘Backdoor’

Intego has been examining several samples of new Mac malware, Tibet.C, which uses Word documents to install a backdoor on Macs. The infected Word files look like real files when users double-click them – they display text just like regular Word files – but actually contain three parts, that are concatenated within the file, and […]

Read more ...

Doctor Web-the Russian developer of IT security software-is notifying users of a wave of flooder applications designed to render Counter-Strike and Half-Life game servers, as well as other GoldSource servers, non-operational. Some of these malignant programs may also do harm to the criminals who use them.Competition among owners of game servers is traditionally high, especially, […]

Read more ...

On Monday, I provided steps on how to avoid your Mac being compromised by the Flashback trojan. Today I will provide information on how to locate a Flashback infection. To better understand the steps below, it is better to also know a bit about Flashback. It’s an OS X malware family that modifies the content […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments