The Latest in IT Security

Posts Tagged ‘acts’

The surest way to know that an attack method is working for a malware gang is seeing the method repeated over a period of several months. In Commtouch’s October Trend Report we described an attack targeting Android users. Last week saw a repeat of the attack with a few refinements. The main elements: Single link […]

Read more ...

Sucuri – If you look at our Labs malware dump for the last few days, you will find something odd in the name of the top domains distributing malware: 712 redirections http://moi-verygoods.ru/simmetry?6154 redirections http://moiverygoods.ru/simmetry?6135 redirections http://webverygoods.ru/simmetry?6131 redirections http://moiverygoods.ru/simmetry?688 redirections http://24-verygoods.ru/in.cgi?9 Can you see the similarity? All of them have “very good” as part of the […]

Read more ...

We are seeing an interesting trend lately. A site gets compromised and starts to distribute malware to its users. The webmaster (owner of the site) searches everywhere for malicious strings, and can’t find anything. Where can it be hidden? It could be outside the root directory of your site. On many sites we analysed in […]

Read more ...

Categories

TUESDAY, DECEMBER 11, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks