The Latest in IT Security

Posts Tagged ‘intel’

Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and other methods were effective for various lengths of time. But eventually antimalware programs gained detection techniques to combat these steps.Malware authors next started frequently changing code and other data; now malware binaries are modified […]

Read more ...

While investigating some new malware samples this week, we came across a few interesting files that use a new trick with an undocumented instruction. We had to do a bit of digging around the Intel instructions list to solve this little mystery. While it turned out that the trick itself isn’t effective in complicating debugging […]

Read more ...

On September 3, the AntiSec branch of Anonymous announced their March hack of a Dell Vostro laptop used by an FBI agent. AntiSec discovered a file containing a list of millions of Apple iOS devices, including their Unique Device Identifiers (UDIDs) and personal data for their owners.The hackers did not publish the file NCFTA_iOS_devices_intel.csv, but […]

Read more ...


Categories

SUNDAY, JUNE 08, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments