The Latest in IT Security

Posts Tagged ‘functionality’

Tumblr is a microblogging platform that allows users to post text, images, videos, links, quotes and audio to their short-form blogs. The last few days have turned up Tumblr accounts being used by scammers to redirects users to their work-from-home sites. The redirection is based on functionality provided by Tumblr. The scam starts with an […]

Read more ...

In an effort to continue raising awareness about the Rustock botnet that was successfully taken down on March 16th, the Microsoft Digital Crimes Unit (DCU), the Microsoft Malware Protection Center (MMPC) and Trustworthy Computing released a new Special Edition Security Intelligence Report (SIR) today titled “Battling the Rustock Threat“. Our telemetry indicates that the bot […]

Read more ...

The new variant of Bootkit.Trup is making rounds, which is updated to protect the infected MBR. The encryption used in Bootkit.Trup.B is very similar to its old variant “Bootkit.Trup.A” which is simple rotate right (ROR) operation. It gets Drive geometry of the infected disk and then calculates position near end of the partition to store […]

Read more ...


Categories

WEDNESDAY, FEBRUARY 26, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments