The Latest in IT Security

Posts Tagged ‘criminals’

Malware authors (AKA the criminals or the bad guys), use many advanced techniques to hide their activities. From encoding, to encrypting, to auto-generated random domains, conditional redirections and many other interesting methods.In the middle of all their advanced options, they also use simple techniques to confuse the end user to think that a malicious domain […]

Read more ...

One of our security researchers in the AV Labs spotted an Android application posing as the popular Web browser Firefox and is hosted on several Russian websites (Note that these sites are still up and running as of this writing). The Android application files (.APK) users can download from them not only vary in file […]

Read more ...

Yesterday, we wrote about the return of Amazon spam, and how criminals behind this campaign led users to have their software exploited via the Blackhole exploit kit, especially if they’re not properly patched. At the end of that entry, we included a list of campaigns that use popular brand names that criminals bank on to […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments