The Latest in IT Security

Posts Tagged ‘fake names’

Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage […]

Read more ...

Another fake “contract” spam leading to malware, hosted on chredret.ru . Date:      Tue, 27 Dec 2011 06:06:18 +0700 From:      “Destinee Mills” Subject:      The variant of the contract you’ve offered has been delcined. After our legal department studied this contract carefully, they’ve noticed the following mismatches with our previous arrangements. We’ve composed a […]

Read more ...

The Anonymous hacktivist group has announced that it will launch its very own social network, to be called AnonPlus, after accounts it held with Google+ were suspended for violating terms and conditions. Google+ has recently been enforcing a policy of shutting down profiles which contain fake names or those that represent organisations rather than individuals, […]

Read more ...

Categories

SATURDAY, SEPTEMBER 22, 2018

Featured

Archives

Latest Comments

Social Networks