The Latest in IT Security

Posts Tagged ‘Environments’

One of our analysts has discovered something interesting while debugging the latest version of Flashback, a Mac trojan that attempts to trick people into believing it’s an Adobe Flash Player update. While comparing the differences between Flashback.A and Flashback.B, he saw this routine: Flashback.B performs a “vmcheck”. If virtualization is detected, the trojan aborts itself. […]

Read more ...

Hello everyone, I have the privilege of being the only Naked Security writer attending this years Black Hat conference in sunny Las vegas. This also means I have the honor of trying to provide you with the most interesting developments presented at the event. This morning I attended an interesting presentation titled "Macs in the […]

Read more ...


Categories

SATURDAY, MAY 04, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments