The Latest in IT Security

Posts Tagged ‘hunger’

This fake Amazon spam leads to malware on ehrap.net:Date:      Tue, 7 May 2013 22:54:26 +0100 [05/07/13 17:54:26 EDT]From:      “Amazon.com” [[email protected]]Subject:      Your Amazon.com order confirmation.Thanks for your order, [redacted]!Did you know you can view and edit your orders online, 24 hours a day? Visit Your Account.Order Information:E-mail Address:  [redacted]Billing Address:216 CROSSING CRK NGAHANNAUnited […]

Read more ...

During the last weeks of July, we received reports from customers that their services.exe files were being patched by an unknown malware. The patched services.exe, detected by Trend Micro as PTCH_ZACCESS (for 32-bit version) and PTCH64_ZACCESS (for 64-bit version), was verified to be a component of the SIREFEF/ZACCESS malware family. ZACCESS (also known as ZEROACCESS) […]

Read more ...

Perhaps I spoke too soon about the quietness on the malware spam front. Here’s a spam pretending to be from Amazon.com leading to malware on anarodas.net: From: [email protected] [mailto:Amazon.com] Sent: 25 May 2012 19:02 To: XXXXXXX Subject: Your Kindle e-book Amazon.com receipt. Thanks for your order, XXXXXXX! Did you know you can view and edit […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments