The Latest in IT Security

Posts Tagged ‘malicious activities’

File infectors are malware that are capable of attaching themselves to executable files, e.g. “calc.exe” and “notepad.exe”. When we run an infected file, we don’t notice that “calc.exe” is infected, since it still shows the calculator running properly. But, behind the scenes, the malware is doing its malicious activities. In this post, we will look […]

Read more ...

Java.CogyekaRecently there has been a lot of attention drawn to the vulnerabilities in Java and how they can lead to malware being created. However, it is worth noting that a vulnerability is not always required for malware to exist, as is the case with Java.Cogyeka. While this threat does not exploit any vulnerability in Java […]

Read more ...

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments