The Latest in IT Security

Posts Tagged ‘conjunction’

Win32/Gataka is an information-stealing banking Trojan that can read all of your web traffic and alter the balance displayed on your online banking page to hide fraudulent transfers. It exhibits a modular architecture similar to that of SpyEye, where plugins are required to achieve most of the malware functionality. In our previous blog post, we […]

Read more ...

LinkedIn is investigating reports that approximately 6.4 million user passwords have been posted on the Web. While the breach is still unconfirmed by LinkedIn (as of the time that we wrote this blog), they have acknowledged on their Twitter feed that their investigations have begun. If you're a LinkedIn user, Websense® Security Labs™ recommends that you change your […]

Read more ...

Back in December of 2011, Symantec identified the first case of an Android threat that was used in conjunction with a website-injection campaign targeting sites in the Middle East. Android.Arspam was an Android Trojan that redirected users to sites where a Hacktivist message was being delivered. Today another website-injection campaign has come to light involving […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments