The Latest in IT Security

Posts Tagged ‘novel’

Spoofing – whether in the form of DNS, legitimate email notification, IP, address bar – is a common part of Web threats. We’ve seen its several incarnations in the past, but we recently found a technique known as header spoofing, which puts a different spin on evading detection.Header spoofing is when a URL appears to […]

Read more ...

We did a quick post yesterday about a DroidKungfu sample that appeared to use a novel infection vector. Now, as promised, more technical details. The application we’ve been analyzing is called com.ps.keepaccount, and a quick check into its content reveals a couple of findings. The original application (SHA-1: 5e2fb0bef9048f56e461c746b6a644762f0b0b54) does not show any trace of […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments