wwwoldi.ru

Главная | Actual Topics | Обратная связь | Guest Book | В избранное | Сделать домашней
Категории
 Безопасность
 Деньги в Сети
 Право в Сети
 Сети
 Видео
 Процессоры
 Платформа
 Antivirus & Firewall
Календарь

June, 2016
ПнВтСрЧтПтСбВс
12345
6789101112
13141516171819
20212223242526
27282930
Опросы
Какой антивирус Вы предпочитаете для защиты Вашего компьютера?

Kaspersky Anti-Virus
Trend Micro Internet Security
Dr.Web
Panda Antivirus
Eset NOD32 Antivirus
Norton Antivirus
AVG Anti-Virus
CA Anti-Virus
Антивирус Stop!
Avast!
Зачем казе баян?


Результаты
Другие опросы

Всего голосов: 90
Комментарии: 0
Ссылки

Архив Новостей
  June 2016 (13)
  May 2016 (36)
  April 2016 (43)
  March 2016 (52)
  February 2016 (53)
  January 2016 (52)
  December 2015 (58)
  November 2015 (57)
  October 2015 (53)
  September 2015 (50)
  August 2015 (56)
  July 2015 (59)
  June 2015 (63)
  May 2015 (16)
  April 2015 (13)
  March 2015 (34)
  February 2015 (46)
  January 2015 (1)
  December 2014 (3)
  September 2014 (16)
  August 2014 (17)
  July 2014 (18)
  June 2014 (17)
  May 2014 (16)
  April 2014 (18)
  March 2014 (17)
  February 2014 (20)
  January 2014 (14)
  December 2013 (68)
  November 2013 (91)
  October 2013 (100)
  September 2013 (102)
  August 2013 (93)
  July 2013 (88)
  June 2013 (88)
  May 2013 (97)
  April 2013 (113)
  March 2013 (105)
  February 2013 (96)
  January 2013 (96)
  December 2012 (98)
  November 2012 (100)
  October 2012 (118)
  September 2012 (102)
  August 2012 (108)
  July 2012 (104)
  June 2012 (107)
  May 2012 (146)
  April 2012 (213)
  March 2012 (238)
  February 2012 (223)
  January 2012 (168)
  December 2011 (219)
  November 2011 (256)
  October 2011 (263)
  September 2011 (231)
  August 2011 (201)
  July 2011 (211)
  June 2011 (218)
  May 2011 (221)
  April 2011 (251)
  March 2011 (231)
  February 2011 (197)
  January 2011 (220)
  December 2010 (271)
  November 2010 (250)
  October 2010 (245)
  September 2010 (268)
  August 2010 (263)
  July 2010 (262)
  June 2010 (286)
  May 2010 (250)
  April 2010 (274)
  March 2010 (318)
  February 2010 (259)
  January 2010 (259)
  December 2009 (305)
  November 2009 (50)
  June 2009 (459)
  May 2009 (550)
  April 2009 (532)
  March 2009 (510)
  February 2009 (512)
  January 2009 (451)
  December 2008 (428)
  November 2008 (169)
  October 2008 (602)
  September 2008 (496)
  August 2008 (406)
  July 2008 (47)
  June 2008 (42)
  May 2008 (23)
  April 2008 (20)
  March 2008 (21)
  February 2008 (17)
  January 2008 (16)
  December 2007 (13)
  November 2007 (8)
  October 2007 (8)
  September 2007 (5)
  August 2007 (6)
  July 2007 (8)
  June 2007 (5)
  May 2007 (6)
  April 2007 (12)
  March 2007 (6)
  February 2007 (9)
  January 2007 (8)
  December 2006 (11)
  November 2006 (6)
  October 2006 (5)
  September 2006 (3)
  August 2006 (3)
  July 2006 (6)
  June 2006 (1)
  May 2006 (9)
  April 2006 (5)
  March 2006 (5)
  February 2006 (1)
  January 2006 (4)
  December 2005 (5)
  November 2005 (7)
  October 2005 (3)
  September 2005 (3)
  August 2005 (1)
  July 2005 (4)
  June 2005 (3)
  May 2005 (1)
  April 2005 (3)
  March 2005 (4)
  February 2005 (2)
  January 2005 (2)
  December 2004 (2)
  November 2004 (3)
  October 2004 (2)
  August 2004 (1)
  July 2004 (2)
  June 2004 (2)
  May 2004 (3)
  March 2004 (1)
  February 2004 (1)
  January 2004 (1)
  December 2003 (3)
  November 2003 (1)
  October 2003 (2)
  September 2003 (2)
  August 2003 (1)
  June 2003 (1)
  May 2003 (1)
  April 2003 (3)
  March 2003 (1)
  February 2003 (3)
  December 2002 (1)
  October 2002 (4)
  February 2002 (1)
  January 2002 (2)
  December 2001 (1)
  November 2001 (1)
  September 2001 (2)
  August 2001 (1)
  May 2001 (1)
  March 2001 (7)
  February 2001 (1)
  January 2001 (1)
  July 2000 (1)
  March 2000 (1)
  January 2000 (2)
  October 1999 (1)

Kaspersky Lab Discovers “miniFlame,” a New Malicious Program Designed for Highly Targeted Cyber Espionage Operations

Antivirus & Firewall Today Kaspersky Lab announced the discovery of miniFlame, a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber espionage operations



  


Разместил: Kaspersky.com / All News | Дата: 15.10.2018 | Прочитано: 318 | Раздел: Antivirus & Firewall   

Рейтинг статьи

Средняя оценка: 0.00/0Средняя оценка: 0Всего голосов:0



Смотрите также связанные темы

05.06.2018 Virus.Win32.Gpcode.ak
Kaspersky Lab has detected a new version of the ‘malicious blackmailer’ Gpcode - Virus.Win32.Gpcode.ak.
21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a
Flash (Alert)   Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations.     Content A set of secur...
30.01.2018 Apple QuickTime Player (Windows) Version 7.7.3 Out of Bound Read
# Title: Apple Quick Time Player (Windows)Version 7.7.3 Out of Bound Read # Date: 28th January,2013 # Author: Debasish Mandal (https://twitter.com/debasishm89) # Blog : http://www.debasish.in/ # Vendor Homepage: http://www.apple.com/ # Software Link: http://www.apple.com/quicktime/download/ # Version: Apple Quick Time version 7.7.3 # Tested on: Windows XP SP2 / Windows 7 ''' [+] Summary: A memory out of bound read issue exists in Apple Quick Time Player v7.7.3 which can be triggered while trying to open a specially crafted "qtif" image file using Qu...
02.11.2018 Kerio Appoints New Marketing Director to Lead its North American Channel Program
Kim Kelley Brings Years of Product and Channel Marketing Experience to the Role San Jose, Calif. – November 2, 2011 – Kerio Technologies is pleased to announce Kim Kelley as director of field marketing. Kelley will be based in San Jose, and is responsible for management of Kerio’s North and South American and Asia Pacific product and field marketing activities and trainings targeted at active channel partners (IT solution providers). Kelley will also spearhead lead generation, recruitment, activation and retention of new partners for Kerio’s Partner Program. read more
15.08.2018 Protecting Endpoints is the Key to Security Control
Companies today realize that they need more than just good security controls. They must also address compliance with internal security policies and industry regulations. A combination of good security functions and compliance management improves security operations efficiency and maturity. Enterprises can simplify compliance by using a single management console to audit, verify and report on [...]
21.06.2018 Protecting Against Application-Specific Attacks
We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems.  Companies must take these threats seriously and look for [...]
12.06.2018 Think you’re compliant? Can you prove it?
For years, enterprises have stretched their budgets and their IT staffs to comply with government regulations and created internal policies designed to protect customers and employees.  Myriad point products and proprietary standards have sprung up, prolonging and complicating the audit process. The question these companies must now ask themselves now is “how can we prove [...]
29.07.2018 Новости компании Agnitum (июль 2008)

28.09.2018 Wise Program Uninstaller
Приложение для безопасного удаления программ и их остатков из системы.
09.12.2018 Kaspersky Security Bulletin 2015. Развитие угроз в 2015 году
Традиционно конец года – это время для размышлений, время для переосмысления жизни и мыслей о будущем. Мы бы хотели предложить наш обычный обзор основных событий, которые формировали ландшафт информационных угроз в 2015 г.
Нет комментариев. Почему бы Вам не оставить свой?
Вы не можете отправить комментарий анонимно, пожалуйста зарегистрируйтесь.
Google Search
Google

Web

Топ Новостей
1: Ideas for the Future: the Best Projects of ‘CyberSecurity for the Next Generation – Russia & CIS Round 2014’ Chosen in Moscow
Hot NEWS!
Просмотров - 463


2: Panda Cloud Antivirus – лучшее ПО 2013 по версии PC Magazine/RE
Просмотров - 321

3: 25 февраля 2014 — Новая антивирусная лаборатория Agnitum продолжает победную серию в тестах VB100 на Windows 8.1
Просмотров - 297

4: Расследование инцидентов: хищение в системе ДБО
Просмотров - 273

5: Блог: Новая 0-day уязвимость во Flash Player (CVE-2014-0515) используется в атаках типа watering hole
Просмотров - 272

6: Новая антивирусная лаборатория Agnitum продолжает победную серию в тестах VB100 на Windows 8.1
Просмотров - 271

7: Kaspersky Internet Security achieves highest possible score in independent testing by AV-TEST
Просмотров - 265

8: Блог: Тайный покупатель: опасайтесь подделок
Просмотров - 264

9: Unistal лицензирует продукты безопасности Agnitum под своим брендом
Просмотров - 256

10: Блог: Спой с мошенниками
Просмотров - 255

11: «Евросеть» начала продажи антивирусов Panda
Просмотров - 251

12: Panda Security продолжит предоставлять антивирусную поддержку для Windows XP
Просмотров - 251

13: Блог: Черное золото или Черная дыра в кошельке
Просмотров - 251

14: Panda Security дарит защиту за голы на ЧМ по футболу 2014
Просмотров - 246

15: Children and the Internet: the Problem of Undesirable Content
Просмотров - 246

16: Kerio Expands Distribution into New Zealand with Soft Solutions Ltd.
Просмотров - 242

17: PandaLabs опубликовала вирусный отчет за 1 квартал 2014 года
Просмотров - 236

18: 24 марта 2014 — Unistal лицензирует продукты безопасности Agnitum под своим брендом
Просмотров - 232

19: Panda Security выпускает бета-версию нового Panda Global Protection 2015
Просмотров - 231

20: The Story of an Investigation: How to Unravel the Tangle of a Financial Cyber-attack
Просмотров - 230

Google 120X240
Ссылки

Главная | Actual Topics | Статьи | Обратная связь | printZ | Guest Book
2019 © Все права защищены. Карта сайта



.