The Latest in IT Security

Posts Tagged ‘trojan spy’

In August, Doctor Web specialists analysed a myriad of new malware. At the beginning of the month, they discovered a malicious program that compromised sites making use of popular CMSs. In the second half of August, a Trojan-Spy was found that represents a serious risk to Linux machines. Viruses According to the statistical information collected […]

Read more ...

Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an Android app that basically turns a mobile device into a hack-tool capable of stealing information from a connected Windows machine.He managed to find a sample (MD5:283d16309a5a35a13f8fa4c5e1ae01b1) for further investigation. When executed, the sample […]

Read more ...

As a follow up to yesterday’s Kumar in the Mac post… have you received e-mail attachments such as this? Attachments:   •  •  •  Content_of_article_for_[NAME REMOVED]  •  •  Lebenslauf_f? If so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac. Here’s a list of binaries signed by Apple Developer “Rajinder Kumar”. Detected as […]

Read more ...


FRIDAY, JULY 10, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments