The Latest in IT Security

Posts Tagged ‘Backdoor’

Trojans, backdoors, keyloggers and eavesdropping is used by online criminals. The same techniques are also used by governments. Some government do this to spy on their own people or to find dissidents. Other governments do this while investigating criminal suspects.Most of the technology used in such intrusions are not developed by the governments themselves. They […]

Read more ...

Users are receiving emails which pretends to be from iTune store. These are specially crafted emails, which lure the users by assuring them that they are few lucky ones to be selected for Gift Certificate of amount $50. Further the email asks the users to open the the attached zip file with the mail to […]

Read more ...

[More news from my colleagues in Russia on their analysis of an interesting item of bank-targeting malware.] This month we discovered new information on a new modification in the Win32/TrojanDownloader.Carberp trojan family. This trojan is notorious as one of the most widely spread malicious programs in Russia,  stealing money from remote banking systems and primarily […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments