The Latest in IT Security

Posts Tagged ‘step 2’

Step 1: How this started While I was investigating the Trojan.JS.Iframe.aeq case (see blogpost <>) one of the files dropped by the Exploit Kit was an Applet exploiting a vulnerability: <script> document.write(‘<applet archive="dyJhixy.jar" code="QPAfQoaG.ZqnpOsRRk"><param value="" name="kYtNtcpnx"/></applet>‘); </script> Step 2: First analysis So basically I unzipped the .jar and took a look using JD-GUI, a java decompiler. These were […]

Read more ...

Have you ever got a picture that promised to do something amazing if you just press Like? Have you been asked to press Like that in turn will donate a dollar to sick children? A promise of new iPhone as a gift for your Like? It’s probably a fraud. Here is the classic example of […]

Read more ...

We have seen various mutations of the well known “police ransomware” Trojan throughout the year. Despite the threatening and convincing message it carries, most people probably choose to avoid the “fine” by simply removing the malware. Well, the following ransomware is little bit different. After the sample is executed and initial emulators and virtual machine […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks