The Latest in IT Security

Posts Tagged ‘Exploit’

Barracuda Labs – Beginning in early May 2012 and persisting over a period of ten days, Herald Media’s primary news portal (heraldm.com) was compromised and used to serve drive-by download exploits. Based in Seoul, South Korea, Herald Media’s publications include The Korea Herald and The Business Herald.Starting on May 9, a javascript resource used throughout […]

Read more ...

My spam honeypots yesterday yielded a nice example of a spam attack being used to lure people to servers hosting the infamous Blackhole exploit kit, which we've blogged about several times in the last six months or so. The spam arrived the evening before. Here's how it looked: Clicking on one of the links took […]

Read more ...

Today we will be reviewing a cybercriminal’s recipe for success: Hacking LinkedIn’s password (and possibly user-) database. Sending an email to all obtained email addresses, which is urging you to check your LinkedIn inbox as soon as possible. A user unawarely clicking on the link. An exploit gets loaded. Malware gets dropped. Malware gets executed. […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments