The Latest in IT Security

Posts Tagged ‘Signatures’

This looks like it could be a new series of blog posts. The infamous redspacetube.com (80.91.176.192) shows yet another payload using a more sophisticated technique. I’ve been monitoring the situation closely and observed a change in today’s malware behaviour. The previous payload was the XP Home Security 2012 rogue which created a randomly named file […]

Read more ...

LAS VEGAS — A researcher presenting at Black Hat picked apart Sophos Antivirus software and found it lacking in several areas that leave it vulnerable to attack or circumvention — something he says might apply to other antivirus vendors’ products as well, but he just hasn’t looked. Tavis Ormandy, who works as a researcher for […]

Read more ...

The most common malware technique for avoiding detection is to create loads of “fresh” variants. Actually, the component that changes so frequently is the packer – the outer layer of the malware, used by malware authors to encrypt the malware and make it harder to detect – whilst the functionality of the malicious code inside […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments