The Latest in IT Security

Posts Tagged ‘presence’

LulzSec has sailed away – if not off the edge of the world, at least into a part of space and time from which it can no longer trigger scary headlines. It seems we needed something to replace LulzSec, and it looks as though we’ve found it. The indestructible rootkit! The rootkit in question is […]

Read more ...

14
Jun
2011

@RedNose commented on the blog I put up recently about the tool my Russian colleagues have made available for dumping TDL’s hidden file system: I’m going to respond here in case anyone else is confused about this.“I ran the tool and it did not show anything. Does it mean that TDSS is not present?”No, that’s […]

Read more ...

The current wave of Mac OS X FakeAV infection follows a three-step process. To those familiar with Windows-based FakeAV, the pattern in this infection chain is quite familiar. Displays a “scanning page” from poisoned Google searches Prompts a download of a .ZIP which contains a .PKG installer. This installer installs a downloader. The downloader downloads […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments