The Latest in IT Security

Posts Tagged ‘Credentials’

Any malicious code that has infected 25,000 computers–60% of them in the United States–and achieved a spam rate of 80 million messages per hour, which in turn lead to 1,400 compromised websites, is a threat worthy of analysis. Such is the case with the malware we detect as Win32/TrojanDownloader.Zortob.B. This computer Trojan can steal credentials […]

Read more ...

A spam wave that has been circulating for roughly a month is stealing Yahoo login credentials by exploiting an old – yet unpatched – vulnerability in a component of the Yahoo Developers blog.

Read more ...

Social networks are actively used by cybercriminals to spread malware. The most common type of attacks in Twitter usually show the same behaviour: 1.- You get a Direct Message (DM) from one of your contacts, with a shortened link. 2.- You click on the link. 3.- Any (or even all) of the following options will […]

Read more ...


Categories

WEDNESDAY, MAY 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments