The Latest in IT Security

Posts Tagged ‘counterpart’

We continue to analyse the Shamoon malware. This blog contains information about the internals of the malicious samples involved in this campaign. Samples nesting The main executable (dropper) includes 3 resources, each maintains a ciphered program. The cipher is pretty simple ? xor by dword. This was mentioned in our first blog-post. Resource PKCS12:112 maintains […]

Read more ...

Yes, you have probably heard the news: a new variant of Spitmo – Zitmo/ZeuS’s counterpart for SpyEye, which previously targeted Symbian phones only – has recently been spotted on Android. The scenario is the same as before: a victim, browsing on a PC infected with SpyEye, logs in her bank’s website. SpyEye injects forms and […]

Read more ...

A few days ago I published a blog post regarding the reverse engineering of the Mac OSX Rogue AV registration routine. The goal was to see if the product was acting like a legitimate one once registered. The product behaved normally, and pretended to clean the machine like their windows counterpart. It was also possible […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments