The Latest in IT Security

Posts Tagged ‘figure 1’

Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. For more information about its malware spreading campaigns and victims, refer to our first blog post. In this post we’ll cover the technical details of the malware, including the overall architecture, as […]

Read more ...

Ahead of this week's G20 summit in Saint Petersburg, Russia, attackers are leveraging the meeting's visibility in targeted attacks. One particular campaign we have identified is targeting multiple groups. They include financial institutions, financial services companies, government organizations, and organizations involved in economic development.   Figure 1. Email purporting to be from G20 Representative   […]

Read more ...

File infectors are malware that are capable of attaching themselves to executable files, e.g. “calc.exe” and “notepad.exe”. When we run an infected file, we don’t notice that “calc.exe” is infected, since it still shows the calculator running properly. But, behind the scenes, the malware is doing its malicious activities. In this post, we will look […]

Read more ...

Categories

THURSDAY, OCTOBER 18, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks