The Latest in IT Security

Posts Tagged ‘Attackers’

As a follow up to yesterday’s Kumar in the Mac post… have you received e-mail attachments such as this? Attachments:   •  Christmas_Card.app.zip  •  Content_for_Article.app.zip  •  Content_of_article_for_[NAME REMOVED].app.zip  •  Interview_Venue_and_Questions.zip  •  Lebenslauf_f?r_Praktitkum.zip If so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac. Here’s a list of binaries signed by Apple Developer “Rajinder Kumar”. Detected as […]

Read more ...

Globo.com, one of the largest Brazilian web portals (ranked #107 on Alexa and #6 for Brazilian traffic) appears to be compromised and all visits to it are being redirected to a sub page inside pagesinxt.com. If you go to g1.globo.com (or any other of their sub domains), you will end up on a page full […]

Read more ...

Financial theft is one of the most lucrative forms of cybercrime. Malware authors continue to deliver sophisticated tools and techniques to unlock online bank accounts. Attackers design and develop botnets to perform financial fraud, targeting banks and other institutions for profit. These botnets traditionally have monitored victims’ Internet activities and intercepted banking transactions to extract […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments