The Latest in IT Security

Posts Tagged ‘Landscape’

It seems like Bitcoin is gaining popularity not only in the computing industry, but in the threat landscape as well.We’ve recently reported a couple of attacks involving malware that installs a Bitcoin mining application into affected systems. Apart from turning systems into unwilling “miners”, such malware also disrupt usage, since the mining process takes up […]

Read more ...

In our last blog about Android malware, we discussed the expanding threat landscape for Android malware. Recently, we received an Android package in our collection and observed that this malicious application uses a rooting exploit that targets Android devices running OS Versions 2.3 or earlier to gain root privileges on the compromised device. The malware […]

Read more ...

03
Aug
2011

We’ve published a detailed analysis of Sality in a whitepaper titled, “Sality: Story of a Peer-to-Peer Viral Network.” Sality is a file infector that spreads by infecting executable files and by replicating itself across network shares. Infected hosts join a peer-to-peer network used to propagate malware on the compromised computer. Typically, those additional programs will […]

Read more ...


Categories

SATURDAY, MAY 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments