The Latest in IT Security

Posts Tagged ‘sums’

We continue to analyse the Shamoon malware. This blog contains information about the internals of the malicious samples involved in this campaign. Samples nesting The main executable (dropper) includes 3 resources, each maintains a ciphered program. The cipher is pretty simple ? xor by dword. This was mentioned in our first blog-post. Resource PKCS12:112 maintains […]

Read more ...

Whether you like it or not, Facebook is making its new profile format – known as the Timeline – compulsory. In the next few weeks, every Facebook account will be updated with the new-look profile, presenting a scrapbook of all of your past status updates and photographs. Facebook hopes that you might even fill in […]

Read more ...


Categories

MONDAY, MAY 25, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments