The Latest in IT Security

Posts Tagged ‘background information’

Determining who is ultimately behind targeted attacks is difficult as it requires a combination of technical and contextual analysis and the ability to connect disparate pieces of information together over a period of time. Moreover, any one researcher typically does not necessarily have all these pieces of information and must interpret the available evidence. Too […]

Read more ...

Two years ago, in 2009, an open-source, peer-to-peer digital cash system launched. Cutely called Bitcoin, it was based on an academically-flavoured paper entitled “Bitcoin: A Peer-to-Peer Electronic Cash System”. The paper’s author, and the creator of the Bitcoin project, was the enigmatically-named Satoshi Nakamoto. No-one seems to know – or, more accurately, no-one is saying […]

Read more ...

It all started with a fake Firefox installer from: firefox.dl-networks.in/firefox_4.0.1.exe This is a server located in the Ukraine, running Apache/2.2.17. Firefox 4 is indeed the latest version of the browser: Except the bad guys got the icon wrong… this one is for CCleaner. Here is the VirusTotal report (8/43). Upon installation the malware connects to: […]

Read more ...


Categories

SATURDAY, APRIL 27, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments