The Latest in IT Security

Posts Tagged ‘conclusion’

15
Apr
2012

Social Engineering plays an extremely significant role in the success of phishing attacks. As more and more users become aware of the problem fraudsters need to find more creative ways of convincing users to surrender personal information to fraudulent websites. It seems that most fraudsters have come to the conclusion that messages crafted to address […]

Read more ...

We all thought that the days of ZBot trojan are long gone, but maybe it was only our hope and not the reality. We have started to detect in an aggressive spam campaign with emails pretending to come from DHL, a variant of the ZBot trojan horse detected by Avira as TR/Spy.ZBot.RU. The email contains […]

Read more ...

A new study has tossed the big browsers into the security mosh pit and decreed that Google’s Chrome comes in first, Microsoft’s Internet Explorer pulls in at a close second, and Mozilla Firefox is bleeding a bit like a stuck pig. The study, released Friday by Accuvant Labs, found that Firefox has four “unimplemented or […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments