The Latest in IT Security

Posts Tagged ‘protocol’

We?ve recently experienced yet another case of a root certificate authority (CA from now on) losing control of its own certificates. And yet again, we have been waiting for either the CA or the browser to do something about it. This whole mess stems, once again, from both a governance and a technical problem. First, […]

Read more ...

13
Feb
2013

New malware emerged recently attacking Android and Windows platforms.Main capabilities: Steals information and downloads filesFile size: 330,984 bytesFile type: APK This malware comes up being a system solution that assists with accelerating your system. Right after set up, it displays an image launcher.After the harmful application is launched, the user will discover its homescreen.The application […]

Read more ...

In our joint analysis of a W32.Flamer command-and-control (C&C) server, as documented here, we described several C&C server protocols present in code on the server.  One of those protocols we knew was associated with W32.Flamer. The other remaining protocol had not previously been observed in the wild and no samples were retrieved which used those […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments