The Latest in IT Security

Posts Tagged ‘variation’

In previous post, my colleague talked about new way to inject virus codes into other normal processes in order to bypass firewall’s detection. During the continuous research of ZeroAccess, we found there’re some improvements for this series of anti-detection and anti-debug methods. And what’s most interesting is ZeroAccess seems to really like lsass.exe. It often […]

Read more ...

Have you ever wished that someone would randomly deliver free stuff to your doorstep? Well, you’re probably not the only one. Everybody loves free things. Problem is, there really isn’t any such thing as ‘free’ – not these days. So naturally, when Linda Hall and her daughter Amanda started having boxes of merchandise delivered to […]

Read more ...

Most people think that the social networking giant, Facebook, is a place to share photos and connect with people. Unfortunately, the network is also used to spread fake/scam messages that play with users belief, making them click on such scam messages. A new scam has spread quickly across Facebook this weekend, pretending to be a […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments