The Latest in IT Security

Posts Tagged ‘subroutines’

04
Apr
2013

There is a new malicious ongoing campaign on Skype. It?s active and kicking yet. The infection vector is via social engineering abusing infected Skype by sending massive messages to the contacts like these ones: i don’t think i will ever sleep again after seeing this photo http://www.goo.gl/XXXXX?image=IMG0540250-JPG tell me what you think of this picture […]

Read more ...

Last night, we received a new version of the #Madi malware, which we previously covered in our blog. Following the shutdown of the Madi command and control servers last week, we thought the operation is now dead. Looks like we were wrong. The new version appears to have been compiled on July 25th as it […]

Read more ...

20
Oct
2011

This is an active investigation by Kaspersky Lab’s Global Research & Analysis Team. We will be updating this FAQ document as necessary. What exactly is Duqu? How is it related to Stuxnet? Duqu is a sophisticated Trojan which seems to have been written by the same people who created the infamous Stuxnet worm. Its main […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments