The Latest in IT Security

Posts Tagged ‘code fragment’

In today’s threat landscape, distributing malware and developing malware are two different worlds. Both require a different set of skills in order to work and in order to achieve their separate goals. For example, in my blog post Get gamed and rue the day…, I described a bot-controlled worm in which the code fragment suggested that […]

Read more ...

It has been three years since we published Lock, stock and two smoking Trojans in our blog. The article describes the first piece of malware designed to attack users of online banking software developed by a company called BIFIT. There are now several malicious programs with similar functionality, including: Trojan-Spy.Win32.Lurk Trojan-Banker.Win32.iBank Trojan-Banker.Win32.Oris Trojan-Spy.Win32.Carberp Trojan-Banker.Win32.BifiBank Trojan-Banker.Win32.BifitAgent […]

Read more ...

Modification of the hard drive areas responsible for the initial loading of the system has become increasing popular with cybercriminals. Moreover, cybercriminals have now moved on from just modifying the MBR (master boot record) to infecting the code of the NTFS loader. We recently discovered an interesting piece of malware — Cidox. It is peculiar […]

Read more ...


Categories

WEDNESDAY, NOVEMBER 13, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments