The Latest in IT Security

Spammers are turning to an old technique known as hailstorm to slip past anti-spam and anti-malware filters. Researchers say that hailstorm spam, first spotted in 2008, has been improved and is once again being used, only this time to spread Dridex banking malware and Locky ransomware. “Hailstorm attacks have become much more prevalent in 2016,” […]

Read more ...

Recently, we have noticed that fake pharma sites seem to have discovered the use of JavaScript to change the “Stay or Leave” messages that you see when you try to close or leave their sites. In cyber-security, fake pharma is the term we use to describe the peddling of drugs and medication, whether they are […]

Read more ...

Spammers have been compromising North American Apple users’ iCloud accounts, and using them to send spammy text messages to mobile users in China. The messages advertise counterfeit Prada and Coach handbags – nothing exceptional here – but the spam campaign is definitely unusual. “This spam campaign has been on-going for several months, but in many […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments