The Latest in IT Security

Posts Tagged ‘command prompt’

In the vein of fake computer lockers everywhere, such as the Trojan.Ransomlock, Trojan.Fakeavlock, and Trojan.Winlock families, comes Trojan.Shadowlock. Unlike any of its predecessors however, this malware “encourages” users to fill out an online survey instead of outright demanding an online payoff. Online surveys in general return very little money, but they do eventually add up […]

Read more ...

When it comes to innovation, cyber-criminals have no borders, or that’s what we believe after analyzing this piece of multi-language malware detected as Trojan.Ransom.IcePol.

Read more ...

Doctor Web-a Russian developer of IT security software-has discovered a new Windows blocker program added to the virus database as Trojan.Winlock.5729. It uses standard Windows tools to block access to the system by changing local user passwords – the feature that distinguishes it from other programs of its kind. Traditionally ransomware use a special application […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments