The Latest in IT Security

Posts Tagged ‘Disguise’

Today we came across a new malicious spam campaign that is actively sent out by the Cutwail spam botnet. The suspicious email claims to be a bill summary from the New York-based energy company Con Edison, Inc. It may use the subject line “ConEdison Billing Summary as of <DATE>” and the attachment uses the filename […]

Read more ...

Sometimes they claim to have found a funny picture of you, say that you look like you’ve lost weight, or that there’s a horrible blog going around about you. Whatever the nature of the disguise used by phishing attacks on Twitter, the modus operandi is always the same. Scammers will send you a message, possibly […]

Read more ...

Apple’s iPhone 5 is due to be revealed to the world tomorrow, which makes today the perfect opportunity for cybercriminals to take advantage of the excitement and exploit it for their own ends. Journalist Abram Wagenaar was one of those who has received a malicious email, claiming to be from Apple and giving details of […]

Read more ...


Categories

SATURDAY, MAY 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments