The Latest in IT Security

Posts Tagged ‘obfuscator’

With the growth in adoption of 64-bit architectures and associated operating systems, we’re seeing the usual malicious suspects following the trend. We have seen variants of several families, including Alureon, Koobface, Sirefef and Ursnif targeting this platform. These families adopt various techniques to prevent their detection and removal, one of which is obfuscation. Let’s take […]

Read more ...

Usage of commercial grade software protectors/cryptors/obfuscators is a very common trend in desktop malware landscape. They are mainly used to make the analyst’s life tough by adding extra layers of protection.  Similarly, there have been quite a few open source obfuscators and professional obfuscators used in the malware families implemented in Java as well for […]

Read more ...

Last week, our friends at ThreatPost posted about the ever-growing infection of websites hosting Black Hole Exploit Kits. A Black Hole exploit takes advantage of unpatched Windows operating systems. It also targets other software, such as Java and Adobe Reader, that can be installed on Windows platforms, which are a lot. Since the kits are already available in […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments