The Latest in IT Security

Posts Tagged ‘Investigations’

28
Apr
2012

The moment of infection, and the circumstances that lead to the introduction of malware to a system, are often not obvious. This short case study examines our observations and investigations into a particular example that illustrates a fairly typical method of compromise that is played out countless times each day? all over the web. A […]

Read more ...

It is a very common habit of internet users to download the videos or unknown software from the reputed video sharing websites. There is nothing un-common in doing so, but there could be a chances of luring the users in the form of presenting advertisements to the types of interesting draw contests of false websites […]

Read more ...

Members of the Koobface malware gang might be feeling a little hot under the collar as evidence has begun to spill onto the internet about the alleged identity of one of its members. The Koobface botnet has been terrorising millions of internet users since mid 2008, and much investigation has taken place into how the […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments