The Latest in IT Security

Posts Tagged ‘signature’

04
Jan
2012

Malware authors always seem to closely monitor trends in Web security development in order to create a variety of browser-based attacks. Just to name a few, techniques such as code obfuscation, plug-in detection and affiliate management are often used. This is why we, at M86 Security, weren’t surprised to see a malicious site which loads […]

Read more ...

A few months ago we did a post about backdoors, explaining how they work and how to look for them. If you didn’t read it, take a read here:ASK Sucuri: What about the backdoors?However, we still see on online forums people recommending to search for “eval ( base64_decode” and things like that when searching for backdoors. If […]

Read more ...

Do you like to add all types of “widgets” and cool badges to your site? Be careful which ones do you choose, or your site may get compromised. Be specially careful if the widget vendor sells the technology and doesn’t inform its users. Why, you may ask? Recently, a popular widget site (feedcat) was sold […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments