The Latest in IT Security

Posts Tagged ‘configuration file’

Last week, we reported about ANDROIDOS_NICKISPY.A and ANDROIDOS_NICKISPY.B, a kind of Android malware that records phone calls made from an infected device and sends it to a remote site.This week we saw another has the same code structure as ANDROIDOS_NICKISPY.A, also does not display an icon in the device, and executes similar routines, save for […]

Read more ...

Due to the growing popularity of smartphones running the Android OS, the smartphone market is seeing immense growth. Whenever a product attracts attention in a market, that item will be targeted by attackers making use of its popularity as an attack vector. We expect the threat landscape for Android malware will grow considerably in the […]

Read more ...

We have encountered another LICAT variant that is being spread via fake IRS spam to people under specific organizations, including Trend Micro. As you may recall, LICAT is known for its use of dynamic domain generation algorithm (DGA) technique. In the spammed message, recipients are informed of an issue regarding their tax payment. The message […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments