The Latest in IT Security

Posts Tagged ‘fraud scheme’

September 2011 was relatively quiet and did not bring any major burst of viral activity; apparently, malware makers, back from summer vacation, decided to devote themselves to more pragmatic pursuits. However, the month did see the discovery of a Trojan horse of unique architecture capable of infecting BIOS. Also a new backdoor for Mac OS […]

Read more ...

(Note: This blog was written on September 2. We decided to postpone publishing it due to an ongoing joint effort to shut down servers and block domain names. The variant studied is not the latest but accurately reflects the functionalities of the threat.) Trojan.Bamital appeared in the summer of 2010. The threat really became prevalent […]

Read more ...

W32.Xpaj.B is one of the most complex and sophisticated file infectors Symantec has encountered. In an older blog post, Piotr Krysiuk calls it an “upper crust file infector.” He describes several different approaches that the infector uses to increase the difficulty in detecting infected samples. The techniques W32.Xpaj.B uses to conceal itself within an executable […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments