The Latest in IT Security

Posts Tagged ‘propagation’

W32.Morto first made headlines in August because of its capability to spread by Windows Remote Desktop Protocol (RDP). The worm was unique because it was the first of its kind to use the protocol.  However, this wasn't the only unique aspect of the worm. My colleague, Cathal Mullaney, also discovered that W32.Morto introduced the usage […]

Read more ...

The KOOBFACE botnet became known for using popular social network sites as vector for propagation and abusing these platforms for malicious purposes. Currently, it has been observed that KOOBFACE does not actively propagate via social networks, but rather propagates via a torrent peer-to-peer network through Trojanized shared application files.Based on our research, we found a […]

Read more ...

Scam Signature Message:  Dad walks in on daughter…EMBARRASING!!! This really has to be an awkward moment. Scam Type: Survey Scam, Rogue Application Trending: June 2011 Why it’s a Scam: Clicking on the Wall post link takes you to the follow page: Clicking “Share on Facebook” loads the following screen: Once you click the “Share Link” button you […]

Read more ...


Categories

SATURDAY, APRIL 05, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments