The Latest in IT Security

Posts Tagged ‘configuration files’

14
Sep
2011

Bitсoin is an electronic currency built with P2P and designed for anonymous financial transactions in the Internet. Besides the obvious advantages for users this currency is also very ‘capable’ for cybercriminals. We wrote about different examples of malware used for monetization here and here. But now we will discuss TDSS and its new module for […]

Read more ...

This is a short update to our prior post concerning Zitmo on Android. Is this really Zitmo? This fake Trusteer malware shows several differences with prior Symbian variants, but, for simplicity (and because it’s easy to remember), we call it Zitmo. This does not mean this variant was written by the same authors (no proof […]

Read more ...

The first version of ZeuS-in-the-Mobile (ZitMo), malware which targets mTANs, was discovered in the end of September 2010. In that case it was targeting Symbian smartphones. Later on, ZitMo versions for Windows Mobile and Blackberry were found. It comes as no surprise that cybercriminals have created new and sophisticated pieces of mobile malware for Symbian […]

Read more ...


Categories

SUNDAY, APRIL 06, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments