The Latest in IT Security

Posts Tagged ‘Blog’

Last week, we monitored three popular Android app stores – Google Play, Nduo and GFan – and found several adware on these app providers. When installed, adware typically display annoying advertisements. The chart below shows the adware that were still available online from August 12-18. Based on our findings, GFan had the most number of […]

Read more ...

We continue to analyse the Shamoon malware. This blog contains information about the internals of the malicious samples involved in this campaign. Samples nesting The main executable (dropper) includes 3 resources, each maintains a ciphered program. The cipher is pretty simple ? xor by dword. This was mentioned in our first blog-post. Resource PKCS12:112 maintains […]

Read more ...

McAfee Labs researchers have seen an increase in instances of the McAfee SECURE logo being falsified as part of a “ransomware” campaign. Once a machine is infected, the malware checks to see which country the user is located in. It then displays a localized graphic containing a police logo and a message announcing that the […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments