The Latest in IT Security

Posts Tagged ‘micro products’

10
Aug
2012

We have received several reports and inquiries about file infectors PE_QUERVAR.B-O (mother file infector) and PE_QUERVAR.B (infected file). Both are getting some media attention, specifically in Europe. Reports identify infections registering mostly in Netherlands. Its massive spreading maybe explained by a couple of things: It infects file that are most commonly found and shared in […]

Read more ...

Last month, Microsoft released a fix tool in order to address a vulnerability in Microsoft XML Core Services. The said vulnerability, according to the Microsoft Security Advisory, could allow remote code execution if a user views a specifically crafted webpage using Internet Explorer. It has been given the identifier CVE-2012-1889. Since the vulnerability exists in […]

Read more ...

When I read this blog entry a few days ago, the first question that entered my head was, “Is this another targeted attack?”. I took a look at the .PDF discussed in the entry and it appeared to be a document addressed to employees of a certain defense contractor. Trend Micro products detect this malicious […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments