The Latest in IT Security

Posts Tagged ‘viral code’

W32.Morto first surfaced in August 2011 causing a stir when it targeted weak passwords on Remote Desktop Protocol Connections in order to propagate across networks. W32.Morto.B, the new variant, now has the ability to infect executable files on a compromised computer. Let’s take a look at the infected files in a bit more detail. Figure […]

Read more ...

The new variant of W32.Xpaj is in the wild which uses Entry Point Obfuscation (EPO) technique to infect the Windows executable files. This variant is one of the most complex polymorphic infector seen till date. It overwrites any random subroutine from executable with its own code and redirects few call instructions to point to its […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments