The Latest in IT Security

Posts Tagged ‘configuration file’

On Friday, a colleague in our IT department asked about a Mal/Badsrc-C malware detection that had been found by Sophos products on one of their friend’s websites. When I initially downloaded the website it looked clean. However, the automated systems inside SophosLabs were detecting the webpage as being infected with Mal/Badsrc-C. So, I investigated a […]

Read more ...

Yes, you have probably heard the news: a new variant of Spitmo – Zitmo/ZeuS’s counterpart for SpyEye, which previously targeted Symbian phones only – has recently been spotted on Android. The scenario is the same as before: a victim, browsing on a PC infected with SpyEye, logs in her bank’s website. SpyEye injects forms and […]

Read more ...

14
Sep
2011

Bitсoin is an electronic currency built with P2P and designed for anonymous financial transactions in the Internet. Besides the obvious advantages for users this currency is also very ‘capable’ for cybercriminals. We wrote about different examples of malware used for monetization here and here. But now we will discuss TDSS and its new module for […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments