The Latest in IT Security

Posts Tagged ‘trojan spy’

In August, Doctor Web specialists analysed a myriad of new malware. At the beginning of the month, they discovered a malicious program that compromised sites making use of popular CMSs. In the second half of August, a Trojan-Spy was found that represents a serious risk to Linux machines. Viruses According to the statistical information collected […]

Read more ...

Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an Android app that basically turns a mobile device into a hack-tool capable of stealing information from a connected Windows machine.He managed to find a sample (MD5:283d16309a5a35a13f8fa4c5e1ae01b1) for further investigation. When executed, the sample […]

Read more ...

As a follow up to yesterday’s Kumar in the Mac post… have you received e-mail attachments such as this? Attachments:   •  Christmas_Card.app.zip  •  Content_for_Article.app.zip  •  Content_of_article_for_[NAME REMOVED].app.zip  •  Interview_Venue_and_Questions.zip  •  Lebenslauf_f?r_Praktitkum.zip If so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac. Here’s a list of binaries signed by Apple Developer “Rajinder Kumar”. Detected as […]

Read more ...


Categories

THURSDAY, NOVEMBER 14, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments