高度な脅威防止

How to Detect Advanced Threats

March 12, 2015 by Yiyi Miao
How can you detect Advanced Threats and why do you need to? Let's start by defining Advanced Threats: Advanced Threats are threats that are targeted towards specific individuals and organizations in order to obtain data that the attacker...

Scanning Android Package Files (APKs) with Metadefender Cloud

November 04, 2014 by Yiyi Miao
Kaspersky Lab and Interpol's recently released Mobile Cyber Threat Report shows a significant increase in the number of cyber-attacks targeting Android users, highlighting the need for successful anti-malware solutions for the Android OS...

Scanning for Malware in Android Applications

April 14, 2014 by Dan Lanir
Android applications are available through a number of different stores and sites. At some stores, you can even download the app file to your PC and apply it directly to your Android device. This diversity in stores and download mechanisms...

Using File Type Conversions to Eliminate Malware

April 07, 2014 by Yiyi Miao
There have been several stories in the news recently (here and here) about the variant of the Zeus/Zbot Trojan that was found to be using images to hide malicious code.As these articles go into in more detail, this new variant of Zeus...

Can A Video File Contain A Virus?

February 17, 2014
Video files are not typically thought of as potentially malicious or infected file types, but it is possible for malware to be embedded in or disguised as a video file. Due to this common misconception, audio and video files...

PowerShell vs. PsExec for Remote Command Execution

January 20, 2014 by Alin Besnea
PsExec and PowerShell allow admins to be able to execute system commands remotely, without too much pre-configuration or overhead. Monitoring and maintaining large-scale, complex, highly distributed and interconnected systems can be...
Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.