The Latest in IT Security

Posts Tagged ‘Libraries’

As McAfee Labs researchers examine malware, we often have to reverse-engineer those binaries when we don’t have the source code. Because reverse engineering depends heavily on the state of the binaries, most of the time it is a tedious manual task. Any tool or technique that speeds our work is a big help.A lot of […]

Read more ...

This just in, hot off the press, careful with the jQuery libraries you’re using on your websites.We received word from @chris_olbekson via Twitter about some hacks being reported on the WordPress forums:The tweet links to a the fake jQuery domain being used to distribute the malware (jquerys.com). If you click on the domain, it does […]

Read more ...

21
May
2012

It seems that development of the main module of SpyEye stopped with last autumn’s version 1.3.48 – and this is now the dominant strain of SpyEye malware. SpyEye distribution by versions for the period since 1 January 2012* * Others (7%) includes: 1.2.50, 1.2.58, 1.2.71, 1.2.80, 1.2.82, 1.2.93, 1.3.5, 1.3.9, 1.3.25, 1.3.26, 1.3.30, 1.3.32, 1.3.37, […]

Read more ...


Categories

THURSDAY, FEBRUARY 22, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments