The Latest in IT Security

Posts Tagged ‘encyclopedia description’

In a previous post, “Fake apps: Behind the effective social strategy of fraudulent paid-archives,” we exposed the social engineering technique behind Win32/Pameseg – our detection for a family of “paid-archives.” We described the use of “low-ball” techniques and explained how users are led to believe they are making an informed choice. However, the choice ultimately leads to […]

Read more ...

To start the new year, we have added the Win32/Ganelp and Win32/Lefgroo families of worms to the January release of the Malicious Software Removal Tool. Win32/Ganelp spreads via removable drives, uploads stolen information and downloads arbitrary files from remote FTP servers. We have had detection signatures for this family for approximately 2 years and it continues to […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments