The Latest in IT Security

Posts Tagged ‘unwitting users’

Malware like BKDR_JAVAWAR.JG prove that web servers are viable targets by cybercriminals as they store crucial data and can easily be used to infect other systems once unwitting users visit those affected websites.We recently spotted a Java Server page that performs backdoor routines and gains control over vulnerable server. Trend Micro detects this as BKDR_JAVAWAR.JG. […]

Read more ...

Malware writers have devised lots of social engineering tactics to lure users into their scheme. This time around, we saw a Trojan passing itself off as a Trend Micro component as a way to trick users into downloading and executing it.We recently encountered a file and noticed the following properties (see below). For the untrained […]

Read more ...

18
Oct
2011

One of our researchers has come across a supposed hacking tool-GMail Hacker Pro-that claims it can compromise GMail accounts. This tool comes with a fairly slick looking website (complete with live chat support) located at gmailhackerpro(dot)com.  Click to enlarge During installation, it shows users a EULA. Let us just quickly point out that a portion […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments