The Latest in IT Security

Posts Tagged ‘campaigns’

As early as March 2012, we have spotted a number of Tibetan-themed campaigns, and we’ve documented some of them through this blog. So far, the attacks are pretty consistent: they usually arrive as emails with pro-Tibetan sentiments as subjects, and have malicious file attachments.Very recently, however, we found one Tibetan-themed campaign that also touches a […]

Read more ...

For years, we’ve seen reports about criminals preying on internet users using prefabricated email appearing to originate from legitimate e-card companies. Criminals had used the brands of Regards.Com, AmericanGreetings.Com, GreetingCards.Com, and Hallmark.Com, just to name a few, on their campaigns. Malicious e-card spam-the kind that leads users to download malware or phishing sites-is in the […]

Read more ...

03
Jul
2012

Browsing is a risky activity from a security point of view. The good old times when we could identify a bunch of suspicious sites and avoid them are gone forever. Massive infections of websites are common nowadays, blindly infecting as many sites as possible. Once these sites are compromised, the access is usually sold to […]

Read more ...


Categories

SATURDAY, MAY 31, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments