The Latest in IT Security

Posts Tagged ‘Exploit’

A year ago, we published a blog post titled ‘Backdoor Olyx – is it malware on a mission for Mac?‘. It explored the intriguing questions that lay behind this backdoor’s discovery, delivery and targets. We provided our observations and analysis, and suggested that this threat was used in a targeted attack against unknown victims. However, […]

Read more ...

Be wary of emails claiming to be from Facebook, and saying that you have been tagged in a photograph.Because it might be that you’re the next potential victim of a malware attack.SophosLabs has intercepted a spammed-out email campaign, designed to infect recipients’ computers with malware.Here is an example of what a typical email can look […]

Read more ...

In early July, an update to the Black Hole exploit kit targeted Java vulnerability CVE-2012-1723. The vulnerability could evade the JRE (Java Runtime Environment) sandbox and load additional Java classes in order to perform malicious actions. Details about the vulnerability are here. Although most of the sites used in the attack are newly registered, the Websense® ThreatSeeker® Network can detect an attack […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments