The Latest in IT Security

Posts Tagged ‘authenticity’

How easy is it for bad guys to buy valid digital certificates from CAs using fake data and then start signing Trojan bankers with them? In Brazil it appears to be very easy. Today most software developers digitally sign their programs. The process involves Certification Authorities (CAs) that must verify the authenticity of the files […]

Read more ...

Recently I came across an airline booking confirmation phishing email.  Whilst this is not necessarily a new phishing technique, the email and associated phishing website are quite interesting and at first glance could appear to be legitimate.  In the email, it states confirmation of payment made by credit card, and that the recipient should click […]

Read more ...

If you or any of your friends play Zynga games on Facebook, then you have likely seen the following warning circulating: WARNING to all: If you get an Adobe Flash Player Update message that pops up when you click on Zynga games (mafia, farm, poker HC etc) – DO NOT RUN IT….it is could be […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments