The Latest in IT Security

Posts Tagged ‘Curiosity’

This post is part one of two. Popular games are often used by malware writers as social engineering bait as documented in previous blogs (“Dota Players Own3d” and “Keeping Kerrigan From Infection“). So, with a watchful eye for anything related to games used as an infection vector, we came across a couple of interesting files: […]

Read more ...

Contributor: Christopher Mendes When stalwarts pass away the world mourns their loss, tributes flow and emotions run high. Whenever we lose a legendary figure, their death brings shock or grief and people are hungry for any and every available piece of information about the "How" and the "Why" and the "When" related to the death […]

Read more ...

23
Sep
2011

In addition to an interesting malware attack, last week’s spam honeypots prompted this post on something new I’ve been seeing in some phishing attacks: rather than just drop a phishing page onto a hacked site, the Bad Guys drop a self-contained form-generating kit, and use that to generate the page. Here’s what the phishy e-mail […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments