The Latest in IT Security

Posts Tagged ‘accounting’

This spam leads to malware on ganiopatia.ru: Date:      Mon, 26 Nov 2012 02:31:10 -0500 From:      [email protected] Subject:      RE: ALINA – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most recent schedule. ALINA Prater, […]

Read more ...

Another spam, another “redret” domain. This time the spam is a “changelog” one, the malicious payload is on cjredret.ru/main.php. Date:      Thu, 29 Dec 2011 07:59:51 +0200 From:      [email protected] Subject:      Re: Fwd: Your Changelog UPDATED Hello, as promised chnglog updated -: View Changelog Carey CATHERINE The site is hosted on 91.222.137.170 (Delta-X, Ukraine), […]

Read more ...

Here’s a piece of fairly clever social engineering: Date:      Tue, 22 Nov 2011 12:48:52 +0200 From:      “LILLIE Stinson” [[email protected]] To:      [[email protected]] Subject:      Need your help! Hello! Look, I’ve received an unfamiliar bill, have you ordered anything? Here is the bill Please reply as soon as possible, because the amount is large […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments