Trojan hijacks often-used DLL file for stealthier approach

Trojan hijacks often-used DLL file for stealthier approach


Trojan hijacks often-used DLL file for stealthier approach

Posted: 22 Feb 2012 10:44 AM PST

A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the compromised computer. Ins...

Indian govt to ask Yahoo, Google to route emails through servers in India

Posted: 22 Feb 2012 10:18 AM PST

Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country - even if the mail accounts that receive and sen...

New Zeus/SpyEye makes bots function as C&C servers

Posted: 22 Feb 2012 05:50 AM PST

The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers' ability to take down the botnets using it and to find out the criminals behind them. ...

Users don't bother changing default passwords

Posted: 22 Feb 2012 03:30 AM PST

Most people working with sensitive information want stricter security policies but rarely bother changing default, automatically generated and assigned passwords. To collect the responses, ElcomS...

ISO 27001 and BS 25999-2: Why is it better to implement them together?

Posted: 22 Feb 2012 02:21 AM PST

Lots of companies implementing ISO 27001 struggle how to implement the requirements from Annex A.14 – Business continuity management. The problem is that ISO 27001 does require such a control, but it ...

Security toolkit for online mobile applications

Posted: 22 Feb 2012 02:00 AM PST

KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: mIDentity Trusted Web View, a...

Akamai protects enterprises from DDoS and application security attacks

Posted: 22 Feb 2012 01:30 AM PST

Akamai Technologies introduced Akamai Kona Site Defender, a service designed to protect the brand value of companies by shielding their web sites, applications and associated data in the face of attac...

Novell integrates Mac device management

Posted: 21 Feb 2012 11:45 PM PST

Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk Encryption (FDE) and two...

Security platform uses virtual machine introspection

Posted: 21 Feb 2012 11:30 PM PST

CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, disrupt and respond to advanced...

0 comments:

Post a Comment