The Latest in IT Security

Posts Tagged ‘network traffic analysis’

Command-and-control (C&C) server communication is essential for botnet creators to control zombie computers (or bots). To hide this from security researchers, they often use rootkits and other “tricks”. However, hiding the network traffic – specifically from monitoring outside an infected computer – is not an easy task, but is something that the botnet creators have […]

Read more ...

Sr. Malware Researcher Posted: 9 May 2012 Company name: FireEye Location: Milpitas CA United States Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:*Perform leading edge malware research, analysis (data-mining) and generate content for use in our products *Enhance FireEye’s security content infrastructure, process workflow, and the malware […]

Read more ...

Our analysis, “TDL4 – Top Bot” by Sergey Golovanov and Igor Soumenkov, has rightly been getting a lot of attention. It’s an excellent analytical article which uncovers a very sophisticated and complex malware TDL-4 which is the latest version of TDSS. Some commentators and other security researchers however, focusing on our use of the word […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks