The Latest in IT Security

Posts Tagged ‘human weakness’

We have blogged in the past about Ransomware being a growing menace and that ONE SHOULD NOT PAY RANSOM if affected. Ransomware has now raised its ugly head up once again. Writers of Trojan.Ransomlock.G (a.k.a. Reveton) have updated their locking screen to induce panic and to blackmail the user into paying ransom.Recently, blogger Kafeine found […]

Read more ...

Shylock is a financial malware platform discovered by Trusteer in 2011.  Like most malware strains, Shylock continues to evolve in order to bypass new defensive technologies put in place by financial institutions and enterprises.  While analyzing a recent Shylock dropper we noticed a new trick it uses to evade detection. Namely, it can identify and […]

Read more ...

Scammers love to feast on human weakness.  This time they aim to exploit human ‘need and greed’ to its optimum best. Using recent news is quite common in spam. For example the Libyan uprising, with its rise and fall of Gaddafi, has left a large vacuum with money that is entrapped in the cross fire.  […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments