The Latest in IT Security

Posts Tagged ‘closer look’

Valentine’s Day is here, and stores are flooded with flowers, chocolates, and gift cards. Showing appreciation to your significant other(s) with a box of expensive chocolates has become a tradition, but Googling to find the perfect gourmet chocolate gift has never been more dangerous. Events such as Valentine’s Day are a prime target for many hackers. Because […]

Read more ...

Brod, a researcher on our Threat Research team has been tasked with tracking emerging Mac based threats. Microsoft Excel is one of the tools he uses to chart variants. From April to December 2011, there have been several dozen new Mac threats. Well, that’s nothing when compared to Windows malware — but it’s definitely something […]

Read more ...

This post is part two of two. In our previous post, we came across a couple of files that used some popular games as part of its social engineering technique. One of the files, which was named “diablo3-crack.exe” (after Diablo the video game series) is currently detected as Backdoor:Win32/Fynloski.A. It piqued our interest because we’re […]

Read more ...


Categories

FRIDAY, APRIL 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments