The Latest in IT Security

Posts Tagged ‘dropper’

September 2011 was relatively quiet and did not bring any major burst of viral activity; apparently, malware makers, back from summer vacation, decided to devote themselves to more pragmatic pursuits. However, the month did see the discovery of a Trojan horse of unique architecture capable of infecting BIOS. Also a new backdoor for Mac OS […]

Read more ...

In the first days of September a remarkable malware sample fell nto the hands of Doctor Web’s virus analysts. At first it seemed that the malicious program dubbed Trojan.Bioskit.1 carried a standard Trojan horse payload to infect the MBR and download something from the network. However, a more detailed analysis revealed that it also incorporated […]

Read more ...

At the beginning of this month, my colleague Robert Lipovsky posted an article on a new threat called Win32/Delf.QCZ, also known as Trojan.Badlib or Trojan.Win32.Miner.h. This threat caught the attention of others and additional information has since been added by fellow researchers on the blogs of Kaspersky and Symantec as well as on the H-Online […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments