The Latest in IT Security

Posts Tagged ‘screenshot’

Usage of commercial grade software protectors/cryptors/obfuscators is a very common trend in desktop malware landscape. They are mainly used to make the analyst’s life tough by adding extra layers of protection.  Similarly, there have been quite a few open source obfuscators and professional obfuscators used in the malware families implemented in Java as well for […]

Read more ...

We observed a zero-day attack aimed at a Chinese high school webpage and leveraged the Microsoft XML Core Services vulnerability. This discovery came about just days after Microsoft released an advisory regarding the vulnerability. The perpetrators behind the attack compromised a high school entrance exam result page in Jiangsu, China, which is visited by about […]

Read more ...

We recently stumbled upon a website that supposedly provides the application Skype for Android devices.When visiting the website using an Android device, it shows an APK file (skype52_installer.apk) for download:However, accessing the website using an iOS device yields to the screenshot below:Translation:The new application is being verified and deployed: skype.ipaChecking iphone_free_spaceAfterwards, it informs the user […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments