The Latest in IT Security

Posts Tagged ‘attempts’

Here’s an interesting twist of the Reveton/FBI/police ransomware that has been plaguing internet users lately.In this example, the malware that locks you out of your data, and demands ?100 be paid via Ukash to gain access back to your files, claims to be from the Anonymous hacktivist group.Part of the message reads: We are Anonymous. […]

Read more ...

W32.IRCBot.NG and W32.PhopifasIn a previous blog, my colleague Kevin Savage detailed a social engineering attack that utilized instant messaging applications. While the infection rates of W32.IRCBot.NG and W32.Phopifas have passed their peaks, the modules continue to be updated daily.The infection routine of these threats has not changed since they were discovered, but the threat authors […]

Read more ...

Phishing is not exactly a ground-breaking technique. Quite the opposite, it seems like it has been around forever. This is an indicator of its effectiveness: we might think that it is unlikely that people would give away their banking credentials just because they are asked for them, but still there is a percentage who continue […]

Read more ...


Categories

MONDAY, MAY 06, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments