The Latest in IT Security

Posts Tagged ‘configuration data’

23
Nov
2011

As previously noted, one of the three families added to the November release of the Microsoft Malicious Software Removal Tool is Win32/Dofoil. TrojanDownloader:Win32/Dofoil is a configurable downloader. Dofoil will attempt to receive control instructions from a remote server. The response contains encrypted configuration data containing download URLs and execution options, as visible in a partially […]

Read more ...

For the last few days, much malware research time has been devoted to the brand-new malware that ESET calls Win32/Duqu. One of the features that makes this kind of malware particularly interesting is that it very closely resembles Stuxnet, one of the most sophisticated worms of recent years. Last year we performed in-depth analysis of […]

Read more ...

Most iPhone and iPad users are perfectly happy with the software on the device as it is shipped by Apple. A minority, however, prefer to open up their devices. By doing this, they can: * Run applications and extensions not approved by Apple. * Download software from alternative appstores, without tying those downloads to an […]

Read more ...


Categories

SUNDAY, MAY 12, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments