The Latest in IT Security

Posts Tagged ‘rootkits’

The story of the mysterious malware detected by ESET as Win32/Rootkit.Avatar began in February 2013 when some adverts for this rootkit leaked from Russian cybercrime forums ( This information produced some heated discussions in the malware research community, however a sample of the Avatar rootkit was not found and published, until now. In this blog […]

Read more ...

We’re happy to announce yet another bold experiment in anti-malware – the new Bitdefender Rootkit Remover.

Read more ...

Cyber criminals are trying to find ways to increase the life cycle of injections in Web sites. Usually, when an attacker gains control of a site, the life span of the injected code to that site depends on how fast the Web site administrator notices malicious content added to their Web pages. One of the tactics that cyber […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments