The Latest in IT Security

Posts Tagged ‘fake names’

Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage […]

Read more ...

Another fake “contract” spam leading to malware, hosted on chredret.ru . Date:      Tue, 27 Dec 2011 06:06:18 +0700 From:      “Destinee Mills” Subject:      The variant of the contract you’ve offered has been delcined. After our legal department studied this contract carefully, they’ve noticed the following mismatches with our previous arrangements. We’ve composed a […]

Read more ...

The Anonymous hacktivist group has announced that it will launch its very own social network, to be called AnonPlus, after accounts it held with Google+ were suspended for violating terms and conditions. Google+ has recently been enforcing a policy of shutting down profiles which contain fake names or those that represent organisations rather than individuals, […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments