The Latest in IT Security

Posts Tagged ‘stealth techniques’

Anyone who has been in information security recently knows that it has gotten easier for cybercriminals to build stealth crimeware. The malware we deal with on a regular basis grows ever more difficult to find, while high-end targeted attacks such as Stuxnet and other advanced persistent threats (APTs, the abbreviation I hate) are using ever […]

Read more ...

Last week, we saw reports about TDL4-the most recent iteration of TDSS-exhibit self-propagation routines. The worm component, which Trend Micro detects as WORM_OTORUN.ASH, was first discovered in early March and we have been seeing a continuous increase in this malicious operation based on our internal statistics. North America and Japan, in particular, appear to have […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments