The Latest in IT Security

Posts Tagged ‘freedom’

As a follow up to yesterday’s Kumar in the Mac post… have you received e-mail attachments such as this? Attachments:   •  Christmas_Card.app.zip  •  Content_for_Article.app.zip  •  Content_of_article_for_[NAME REMOVED].app.zip  •  Interview_Venue_and_Questions.zip  •  Lebenslauf_f?r_Praktitkum.zip If so, you may be the target of a spear phishing campaign designed to install a spyware on your Mac. Here’s a list of binaries signed by Apple Developer “Rajinder Kumar”. Detected as […]

Read more ...

Recently, we’ve noticed that there are too many legitimate domains popping up in our url filters with malware. At first we thought we had a huge false-positive (FP) problem, but after analysis we found a pattern. All of the referring links came from the Russian Odnoklassniki server, which is a quite-popular Russian social network. Users […]

Read more ...

It’s time to hang up my spurs as a Naked Security writer, as I have been offered an exciting new career as a nanny! I must admit it took me by surprise when the email offering me the position arrived in my inbox, but when I read the details of the job they were offering […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments