The Latest in IT Security

Posts Tagged ‘buffer overflow vulnerability’

PDF exploits have been targeted by Blackhole exploit kits for some time now. The Blackhole exploit kit will deliver various malicious PDF files to a user if the victim is running a potentially vulnerable version of Adobe Reader. When these PDFs are opened through Adobe Reader, a known vulnerability is exploited which will then compromise […]

Read more ...

We’re nearing the opening of the 2012 Summer Olympics, which will be held this time in London in July. As the event starts to go in full swing, cybercriminals start mounting their scams and schemes to get users to click. Users dreaming of watching the closing ceremonies of the London 2012 Olympics live may find […]

Read more ...

In an ironic twist of events, the news about the malicious email campaign that leverages political issues related to Tibet is now being used in a separate campaign resulting to malware infection. So far, we have encountered two email campaigns using this particular social engineering technique. The first one, according to reports, has a spoofed […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments