The Latest in IT Security

Posts Tagged ‘timestamps’

Here’s a link to the full paper (part 1) about our Red October research. During the next days, we’ll be publishing Part 2, which contains a detailed technical analysis of all the known modules. Please stay tuned. During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and […]

Read more ...

On May 28, my colleagues Peter Szor and Guilherme Venere posted a blog on Skywiper and listed various key filenames. Since then, I have searched these files, as well as some others that appear to be linked to this threat, in our collections. The following table summarizes these investigations.After I finished creating this table, I […]

Read more ...

Last week, Apple released two urgent updates to Mac OS X to: 1. Remove the Flashback malware about which we have already written 2. Automatically deactivate the Java browser plugin and Java Web Start, effectively disabling java applets in browsers Particularly, the second step shows the severity of the CVE-2012-0507 vulnerability exploited by Flashback to […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments