The Latest in IT Security

Posts Tagged ‘Blog’

21
Oct
2011

As mentioned in our previous blog, W32.Duqu was first brought to our attention by a research lab who had been investigating a targeted attack on another organization. This research was conducted by the Laboratory of Cryptography and System Security (CrySyS) in the Department of Telecommunications, Budapest University of Technology and Economics. CrySyS identified the infection […]

Read more ...

Websense ThreatSeeker® Network has been tracking an ongoing spam campaign relating to reports of Libyan leader Colonel Gaddafi's death.  We have been monitoring related spam campaigns about Gaddafi for a while now, and the recent rumours of his death as stated here on Reuters seem to have raised the bar a little with an influx of such spam.   […]

Read more ...

People often uses credit cards online to purchase products but many people fail to validate the site address and proceed with submitting sensitive information such as card numbers. Attackers can then steal credit card information along with the associated CVV number. Here is an example of one such fake website, hosting supposedly ‘free’ services – […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments