The Latest in IT Security

Posts Tagged ‘conclusion’

At last week’s Virus Bulletin 2011 conference Paul Baccas and Stephen Edwards from SophosLabs presented their research paper “Fast fingerprinting of OLE2 files: Heuristics for detection of exploited OLE2 files based on specification non-conformance”. They may win the prize for the longest title, but what does it mean? OLE2 is a container format synonymous with […]

Read more ...

A court in Dusseldorf, Germany, has convicted a man who extorted money out of online gambling websites in the run-up to the 2010 Football World Cup in South Africa. The Frankfurt man, who has not been identified, successfully blackmailed three online betting sites (and attempted to extort money from three others) by threatening them with […]

Read more ...

It all started with a fake Firefox installer from: firefox.dl-networks.in/firefox_4.0.1.exe This is a server located in the Ukraine, running Apache/2.2.17. Firefox 4 is indeed the latest version of the browser: Except the bad guys got the icon wrong… this one is for CCleaner. Here is the VirusTotal report (8/43). Upon installation the malware connects to: […]

Read more ...


Categories

TUESDAY, MAY 07, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments