The Latest in IT Security

Posts Tagged ‘e mail’

We may have come across a Mac malware in the making. Detected as Trojan-Dropper:OSX/Revir.A, the malware disguises as a PDF file to trick user into triggering its payload. It starts by dropping a PDF file embedded in its body and opens it in an attempt to prevent the user from noticing the ongoing suspicious activity. […]

Read more ...

23
Sep
2011

In addition to an interesting malware attack, last week’s spam honeypots prompted this post on something new I’ve been seeing in some phishing attacks: rather than just drop a phishing page onto a hacked site, the Bad Guys drop a self-contained form-generating kit, and use that to generate the page. Here’s what the phishy e-mail […]

Read more ...

A cross-scripting vulnerability affecting Skype’s iOS app has been discovered and a video has been provided, whereby sending a specific a specific text message sent to a user can copy their Address Book. This attack uses Javascript, and, “Executing arbitrary Javascript code is one thing, but I found that Skype also improperly defines the URI […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments