The Latest in IT Security

Posts Tagged ‘unique visitors’

13
Sep
2013

Have you ever wondered about the ads you might have seen being shown on the desktop or in the browser during web browsing sessions at Internet cafes? One of our Analysts, Wayne, certainly did. He recently analyzed a sample (SHA1: c8c643df81df5f60d5cd8cf46cb3902c5f630e96) that gave him an interesting answer. The sample was a rootkit named in its […]

Read more ...

Fake Flash updates are leveraged as a very popular trick amongst attackers to fool users into downloading and installing malware. This week we found a three websites distributing Win32.Sanity.N malware disguised as Flash updates: hxxp://kivancoldu.com/, redirects to hxxp://click-videox.com/ http://kivancoldu.com on 05/02/2013 hxxp://fastcekim.com/, redirects to hxxp://click-videox.com/ hxxp://kivanctatlitug.tk/ d(down) hxxp://kivanctatlitug.tk/ The fake warning at the top of […]

Read more ...

With web malware exploitation kits, continuing to represent the attack method of choice for the majority of cybercriminals thanks to the overall susceptibility of end and enterprise users to client-side exploitation attacks, it’s always worth taking a peek inside them from the perspective of the malicious attacker. In this post, we’ll take a peek inside […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments