The Latest in IT Security

Posts Tagged ‘occurrence’

Malware writers have devised lots of social engineering tactics to lure users into their scheme. This time around, we saw a Trojan passing itself off as a Trend Micro component as a way to trick users into downloading and executing it.We recently encountered a file and noticed the following properties (see below). For the untrained […]

Read more ...

I haven’t seen this fake AICPA spam for a while, but here it is.. this time leading to a malicious payload on the domain jeffknitwear.org: Date:      Thu, 19 Jul 2012 17:03:06 +0300 From:      “Lakisha Rush” [[email protected]] Subject:      Termination of your accountant license. You’re receiving this notification as a Certified Public Accountant and […]

Read more ...

Amidst my usual adventure with Android malware analysis, I saw this snippet of code while skimming through a particular sample’s class modules. Figure 1 Late last year, I was looking deeper into Portable Network Graphics (PNG) image format, especially about the fields that hold textual information. Upon seeing the code, it immediately triggered my suspicion […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments