The Latest in IT Security

Posts Tagged ‘targets’

There’s another case of Backdoor:OSX/KitM.A in the wild. A German-based investigator reached out to us yesterday regarding OSX/KitM. (We wrote about it last week.) KitM stands for “Kumar in the Mac”, which is our designation for spyware — related to OSX/Filesteal a.k.a. OSX/HackBack — that is signed using an Apple Developer ID in the name […]

Read more ...

Last week, we posted some detailed information about the actions that the March 20, 2013 MBR wiper attacks took against systems in South Korea.Today, I’d like to take that and some additional information that has come out about the incident and draw some conclusions about what lessons this attack teaches us.When we look at the […]

Read more ...

February is a short month, but not too short for spam events to make an impact. Valentine’s Day and its associated threats has passed, so now it is time for International Women’s Day-celebrated on March 8 every year. This is a great occasion to express love, respect, and kindness toward women and spammers will always […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments