The Latest in IT Security

Posts Tagged ‘screenshot’

“Customer Feedback” is always important, even when they are victims of state-sponsored attacks Although the Flamer Trojan has “committed suicide” quite a while ago, we continue the malware forensics saga with a new episode. Today, we will be describing a less-documented feature of Flamer called advnetcfg.ocx – a module that acts both as an antivirus […]

Read more ...

Deep inside one of Stuxnet’s configuration blocks, a certain 8 bytes variable holds a number which, if read as a date, points to June 24th, 2012. This is actually the date when Stuxnet’s LNK replication sub-routines stop working and the worm stops infecting USB memory sticks. The specific variable which keeps the “time of death” […]

Read more ...

Barracuda Labs – Beginning in early May 2012 and persisting over a period of ten days, Herald Media’s primary news portal (heraldm.com) was compromised and used to serve drive-by download exploits. Based in Seoul, South Korea, Herald Media’s publications include The Korea Herald and The Business Herald.Starting on May 9, a javascript resource used throughout […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments