The Latest in IT Security

Posts Tagged ‘BlackHat’

08
Jul
2011

.not, on this occasion, the classic Blackhat “It’s your fault that we’ve hacked your server, infected you with a virus, and broadcast your credit card details and gaming credentials to anyone one who cares to access the torrent” self-justification. (Which reminds me of a mugger saying “don’t make me do this to you” while he […]

Read more ...

Over the last couple of months, the concern of whether Mac OS X has become a greater target for attackers has grown, and rightfully so. The Mac OS X market share has steadily increased, and is currently well above 10 percent.   From the attackers standpoint, what it always comes down to is dollars. At a […]

Read more ...

We are tracking another Blackhat SEO SPAM network being managed by http://joomlapoject.net. By the name of the domain, you can guess that they are targeting Joomla sites.When you visit a compromised site, you don’t see anything wrong, but if you view the source, there is a large block of spammy links hidden in there: <span style=”font-style: normal; visibility: hidden; position: absolute; left: 0px; top: 0px”><a href=”http://www.nigeriavillagesquare.com/t3-assets/css/index.php”>ACD Systems Canvas 11 with GIS Plus</a><br><a href=”http://www.nigeriavillagesquar.. […]

Read more ...


Categories

SATURDAY, APRIL 05, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments