The Latest in IT Security

Posts Tagged ‘worm’

Typically users archive file to lump several files together into a single file for convenience or to simply save storage space. However, we uncovered a worm that creates copies of itself even on password-protected archived files. We acquired a sample of a worm (detected as WORM_PIZZER.A) that propagates using a particular WINRAR command line (see […]

Read more ...

We wrote before about the smart methods of fooling users to do things (execute files) which they would not normally do. Two weeks ago we’ve seen a mass mailing in the German language containing malicious payload pretending to be invoices from Apple and Plus.de. Cybercriminals are sending again personalized emails in the German language pretending […]

Read more ...

It has been another month and we have found some more families that need some special attention that the Malicious Software Removal Tool (MSRT) is ideal to give. This month we are focused on cleaning up the Win32/Babonock, Win32/Redyms, and Win32/Vesenlosow families due to their recent increase in prevalence. Lately I have been working with […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments