Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

July 25 2010

18:44
18:42

Myrtus and Guava, Episode 1

Excerpt from text:
"...Over here at Kaspersky, we’ve also taken a look at the malware, and we’ve also come up with a few interesting things...."
18:42

Myrtus and Guava, Episode 1

Excerpt from text:
"...Over here at Kaspersky, we’ve also taken a look at the malware, and we’ve also come up with a few interesting things...."
18:40

Myrtus and Guava, Episode 2

Excerpt from text:
"...Digitally signed malware is a nightmare for antivirus developers...."
18:40

Myrtus and Guava, Episode 2

Excerpt from text:
"...Digitally signed malware is a nightmare for antivirus developers...."
18:39

Myrtus and Guava, Episode 3

Excerpt from text:
"The geographical distribution of Stuxnet infections is just as interesting as the Trojan itself...."
18:39

Myrtus and Guava, Episode 3

Excerpt from text:
"The geographical distribution of Stuxnet infections is just as interesting as the Trojan itself...."
18:37

Myrtus and Guava, Episode 4

Excerpt from text:
"...Over the last few days, all the discussions have boiled down to two possible explanations: either cybercriminals stole the digital certificates using a Trojan, or it was the work of an insider. Our failure to find the dropper or second driver, though, makes the whole story all the more complicated...."
18:37

Myrtus and Guava, Episode 4

Excerpt from text:
"...Over the last few days, all the discussions have boiled down to two possible explanations: either cybercriminals stole the digital certificates using a Trojan, or it was the work of an insider. Our failure to find the dropper or second driver, though, makes the whole story all the more complicated...."
18:34

Myrtus and Guava, Episode 5

Excerpt from page:
"Anyone following the story has probably already read about how the worm, in addition to replicating, attempts to gain access to industrial systems running WinCC from Siemens."...
18:34

Myrtus and Guava, Episode 5

Excerpt from page:
"Anyone following the story has probably already read about how the worm, in addition to replicating, attempts to gain access to industrial systems running WinCC from Siemens."...
18:30
18:30
18:27
18:27
18:26
18:24

February 23 2010

16:48
16:45
16:42

Advanced JavaScript obfuscation (or why signature scanning is a failure) - isc

Excerpt from the post: ..."In this diary I will go through several obfuscation methods the attackers combined into one JavaScript file"...
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl