The Latest in IT Security

Posts Tagged ‘aa’

We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the supposed statement from the German Chancellor regarding the protests in Lhasa, Tibet. The From field indicates that it came from a key officer from the ATC or Australian Tibet […]

Read more ...

Internet users are receiving emails claiming to contain a changelog – but the files attached are really designed to infect computers. Here’s what a typical email looks like, although the precise wording can vary. Subject: Re: Your Changelog Message body: Good day, as promised chnglog attached (Open with Internet Explorer) The subject lines and attachment […]

Read more ...

We are seeing an interesting trend lately. A site gets compromised and starts to distribute malware to its users. The webmaster (owner of the site) searches everywhere for malicious strings, and can’t find anything. Where can it be hidden? It could be outside the root directory of your site. On many sites we analysed in […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments