The Latest in IT Security

Posts Tagged ‘Signatures’

Recent media reports about the OSX.Flashback malware have put the size of the botnet at over 600,000. The botnet is believed to have reached this size by using vulnerabilities such as the Oracle Java SE Remote Java Runtime Environment Denial Of Service Vulnerability (CVE-2012-0507, BID 51261) to spread the malware through exploit kits like Blackhole. […]

Read more ...

Anti Malware Researcher Posted: 29 March 2012 Company name: McAfee Location: Beaverton, OR United States Poster represents: employer Description:Anti-Malware Researcher Location: Beaverton, OR About the Role: The candidate will serve as a Lead for Active Threat Research. In this exciting role you will find yourself dealing with a wide array of challenging Threats including rootkits, […]

Read more ...

Article written by David Sanchez Lavado This post explains how to analyze the malicious code used in current Exploit Kits. There are many ways to analyze this type of code, and you can find tools that do most of the job automatically. However, as researchers who like to understand how things work, we are going […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments