The Latest in IT Security

Posts Tagged ‘executable files’

Fake AV operators continue to change the graphic interface design on their malicious creations. Clones we’ve seen recently include “XP Antispyware Pro 2013,” “XP Defender 2013,” “XP Security 2013” and “XP Antivirus Pro 2013.” Download pages are detected by at least three AVG LinkScanner signatures. Since this is the time of year that legitimate AV […]

Read more ...

Phishing is not exactly a ground-breaking technique. Quite the opposite, it seems like it has been around forever. This is an indicator of its effectiveness: we might think that it is unlikely that people would give away their banking credentials just because they are asked for them, but still there is a percentage who continue […]

Read more ...

Designed in 2007 and introduced in late 2009, the Go programming language developed by Google has been gaining momentum the past three years. It is now being used to develop malware. Recently seen in the wild, Trojan.Encriyoko is a new threat associated with components which are written in Go. The Trojan attempts to encrypt various […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments