The Latest in IT Security

Posts Tagged ‘roots’

The December 2011 edition of the MSRT includes detection and clean-up for the Win32/Helompy Family. Helompy is a worm that propagates by copying itself to the root of removable drives, and its main payload is to record account credentials and login information and send them to a remote server, where the attacker could retrieve them […]

Read more ...

The third and last day of the VB 2011 Conference was as interesting as the other two, in both corporate and technical tracks. The technical track was dedicated to exploits, Java, packers, Flash analysis and others. All topics definitely interesting and useful for the fellow security researchers. The corporate track was for me at least, […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments