The Latest in IT Security

Posts Tagged ‘distribution method’

We included three threat families in the November edition of the Microsoft Malicious Software Removal Tool – Win32/Carberp, Win32/Cridex and Win32/Dofoil. In this post, we discuss Win32/Carberp. The first variant of Win32/Carberp was discovered early last year. This malware has evolved from a trojan downloader that downloads an additional password stealer, such as PWS:Win32/Ldpinch, to […]

Read more ...

When I do public speaking, I often rant about how distracted we are by high profile attacks like Stuxnet even though few of us are responsible for protecting nuclear centrifuges. The vast majority of attacks are using our own computing resources to compromise our infrastructure. Our identities are being stolen, and we’re spamming and DDoS’ing […]

Read more ...

SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank passwords and other financial data.) At the beginning of the year there was a rumor about the “merger” of both toolkits into a new generation of banking Trojan. It is not clear yet whether leaked […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments