The Latest in IT Security

Posts Tagged ‘Blog’

Ever wonder where the term “Pwned” came from? Rumour has it that is started with the game World of Warcraft (WoW), where a map designer, intending to write “the player has been owned”, mistyped it as “the player has been pwned”. In any case, it is widely used today to mean you have been screwed […]

Read more ...

My Russian colleagues Aleksandr Matrosov and Eugene Rodionov have found some time to do some more analysis on Win32/Duqu. (Don’t you guys sleep?) In the previous post (http://blog.eset.com/2011/10/25/win32duqu-it%e2%80%99s-a-date) they concentrated on analyzing the Duqu configuration file format and extracting the exact date on which the system was infected. This time they investigated Duqu’s RPC (Remote […]

Read more ...

A couple of months ago, we showed off a sample of our next-generation malware delivery network (“malnet”) graphs. Since then, we’ve pressed the wizard behind them (Jon) to come up with a way to animate the graphs, so that we could show them in a time-lapse video. Here’s what he’s come up with so far. […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments