The Latest in IT Security

Posts Tagged ‘decryption key’

We recently received a sample of Android malware currently circulating in the Web, known as DroidDreamLight. Once executed on an infected device, this malware steals mobile-specific information and uses this data for malicious activities. Similar to previous info-stealing Android malware, DroidDreamLight (detected as ANDROIDOS_DORDRAE.L) gathers the following specific information from the affected phone: Device model […]

Read more ...

In 1999, a new virus, Win32/Crypto, was discovered. It was using brute-force attacks against its encryption key to decrypt its body. Today, in 2011, variants of Win32/Alureon are bringing this old-school technique back to life, with some extra naughtiness, as you will see below. While working recently on different Win32/Alureon samples, we noticed some behaviour […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments