The Latest in IT Security

Posts Tagged ‘search engines’

Several weeks ago, in early February, I asked the question “Is this the resurgence of Blackhat SEO?“. At the time we had seen a definite increase in the volume of search engine optimisation (SEO) attacks that we were blocking, but it was a little too early to predict whether that trend would continue.So what is […]

Read more ...

In the last few days a malicious program has been discovered with a valid signature. The malware is a 32- or 64-bit dropper that is detected by Kaspersky Lab as Trojan-Dropper.Win32.Mediyes or Trojan-Dropper.Win64.Mediyes respectively. Numerous dropper files have been identified that were signed on various dates between December 2011 and 7 March 2012. In all […]

Read more ...

Analysis of the crypto used by the Trojan.Khan DDoS bot A recent blog post described our analysis of the crypto algorithm used by the Armageddon DDoS malware. This article continues our ongoing series on reversing the crypto mechanisms used by contemporary DDoS botnets; our guest of honor today will be a bot we have been […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments