The Latest in IT Security

Posts Tagged ‘malicious activity’

The US Deputy Defense Secretary William Lynn has revealed that a foreign intelligence agency was behind a hack attack that stole classified information about a top secret weapons system. According to Aviation Week, the weapons system, which is under development, might have to be redesigned after the files were stolen from a military contractor’s computer […]

Read more ...

One of the main goals of a cybercriminal is to gain total control over a victim’s machine. This is currently done through the use of RATs (remote admin tools) and other methods. The infected computers are used by cybercriminals for all sorts of malicious activity. It’s no different with Brazilian cybercriminals – they have the […]

Read more ...

This is a recent malware that targets the Android platform. This Trojan like many typical social engineering Trojans, comes bundled with a game. The credit for discovering it goes to Prof.Xuxian Jiang. Since we have published static analysis of such Trojans in our earlier blogs, this blog covers the dynamic analysis of the Trojan in […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments