The Latest in IT Security

Posts Tagged ‘scanners’

Security experts are playing a game of cat-and-mouse game with malware authors who are continually looking for ways to bypass detection by anti-malware products.As regular readers of Naked Security will know, one commonly-seen method of distributing malware is to embed an attack inside a malformed PDF. And, one way to hide code inside a malicious […]

Read more ...

We all thought that the days of ZBot trojan are long gone, but maybe it was only our hope and not the reality. We have started to detect in an aggressive spam campaign with emails pretending to come from DHL, a variant of the ZBot trojan horse detected by Avira as TR/Spy.ZBot.RU. The email contains […]

Read more ...

Rogue:Win32/FakePAV reappeared about two weeks ago after a brief hiatus and since then we’ve been seeing variants with new names for themselves just about every day. The latest versions call themselves names like “Windows Threats Destroyer”, “Windows Firewall Constructor”, “Windows Attacks Preventor”  and “Windows Basic Antivirus”. You can see some examples of these iterations below. […]

Read more ...


Categories

SUNDAY, MAY 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments