The Latest in IT Security

Posts Tagged ‘windows registry’

Researchers at Trend Micro have analyzed a new Trojan that uses the Windows registry to hide all its malicious code, the security company reported on Friday.

Read more ...

Russian anti-virus company Doctor Web is warning users about the malignant program BackDoor.Saker.1, which is capable of bypassing the User Account Control (UAC). The program’s main function is to execute directives from criminals and, most importantly, to intercept user keystrokes (keylogging). In a compromised system, the Trojan launches the file temp.exe to bypass the UAC. […]

Read more ...

A few days ago I received an interesting email message:Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code. This one was intriguing, though: within hours we received a handful of other samples similar to this, and having a […]

Read more ...


Categories

WEDNESDAY, NOVEMBER 20, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments