The Latest in IT Security

Posts Tagged ‘external sources’

The email Potential victims receive an email with an impersonal form of address and more or less detailed information about the EV-SSL certification process. G Data SecurityLabs have registered four different email designs so far. Here is a selection of subject lines encountered so far: EV-SSL-Zertifikat-App im Smartphone Betriebssystem EV-SSL-Zertifikat. Smartphone Betriebssystem Extended Validation-Zertifikate im […]

Read more ...

The targeted attack campaign dubbed Red October raises an interesting question for people working on the frontline of corporate security. How to defend one’s own organization against such attacks? And the good news is that at least for campaigns such as Red October, the information has been available for a long time already. From a […]

Read more ...

Google Search has a problem. For several weeks now, Google Image search results have been increasingly tainted by Search Engine Optimization (SEO) poisoning. Numerous sites linked to scareware trojans and exploits via Google Image results are discovered every day. Many of these sites would otherwise be considered as safe but they’ve been compromised by a […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments