The Latest in IT Security

Posts Tagged ‘Disguise’

Have you received an unexpected “inter-company invoice” from a company for the period January 2010 – December 2010? If so, chances are that your computer is being targeted by cybercriminals who are using the disguise as a method to infect your computer with a Trojan horse. Companies such as Beazer Homes, KPMG, Miltek, Kraft Foods, […]

Read more ...

I uncovered a very large number of sites that are pushing malware using a smart disguise.Webcams sometime ask the user to install a program in order to view them. This is exactly what the creators of those malicious pages are banking on. Except that users will install a Trojan on their computers instead.Some of the […]

Read more ...

In this month’s MSRT release, we added three new threat families to the detection capability. One of these three is Win32/Nuqel, which has been around for four years since its first variant was found. More than 60 variants of Win32/Nuqel have been identified in the wild. This worm spreads itself via network shares, removable drives […]

Read more ...


Categories

SATURDAY, MAY 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments