The Latest in IT Security

Posts Tagged ‘blacklisting’

Spammers have moved into new fields like social media (e.g., Facebook and Twitter). Like mass-mailing attacks, social media spam runs are triggered by the same motivation. Businesses that use social media can come across Web threats in the course of marketing and promotion. Social media spam may also cause system infections through employees who access social networking sites at work.Spam have come a long […]

Read more ...

W32.Virut is a Windows file infector that’s been around since 2006. It usually makes the top 10 in threat charts and therefore deserves regular scrutiny. Analysis of recent variants show that changes were made to strengthen the communication protocol between the bots and the command and control server to prevent blacklisting, sinkholing, and hijacking of […]

Read more ...

20
Aug
2011

Google researchers have recently released a rather interesting paper on Trends in Circumventing Web-Malware Detection, and several people have been asking me about it (or rather, the blog that announced it. Read the full paper, folks! There's a lot more in there than the "cloaking" stuff, though if you're not a specialist, you may find […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments