The Latest in IT Security

Posts Tagged ‘Backdoors’

Patrick, our resident rogue AV expert from the AV Labs, have his eyes set on one particular family-FakeScanti. This rogue family first appeared in the first quarter of 2010, and it has been within the radar ever since. Enter AV Protection 2011. This particular rogue is the latest variant in a handful of noteworthy rogues […]

Read more ...

We’ve just come across an IRC controlled backdoor that is enables the infected machine to become a bot for Distributed Denial of Service attacks. The interesting part about it is that it’s a Mach-O binary – targeting Mac OS X. ESET’s research team compared this to samples in our malware collection and discovered that this […]

Read more ...

At Virus Bulletin 2011, we presented on the exploding level of delivered Java exploits this year with “Firing the roast – Java is heating up again”. We examined CVE-2010-0840 exploitation in detail, along with variants of its most common implementation on the web and some tools and tips for analysis. Microsoft’s security team presented findings […]

Read more ...


Categories

WEDNESDAY, APRIL 09, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments