The Latest in IT Security

Posts Tagged ‘registry values’

In our previous blog post our AVG Web Threats Research group analyzed a Blackhole exploit kit serving the fake FBI Ransomware. Today we will have a look at the ransomware itself. Payload Here is a typical ransom malware payload once it’s active on infected computer: User’s desktop is locked with a full-screen information displayed Task […]

Read more ...

Last week, there was ample coverage on the data breach on SK Comms, one of the popular service providers in South Korea that offers three types of service-social networking and instant-messaging (IM), as well as mobile phones. The breach affected user accounts of Nate portal and Cyworld, both under SK Comms.Within the same week, we […]

Read more ...


Categories

SUNDAY, APRIL 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments