The Latest in IT Security

Posts Tagged ‘Images’

Another item in the post-vacation queue for the blog is an update on the big Fake AV attack we posted about at the beginning of the month. From last Friday's logs, I pulled data on one sample server. Here's what it had been up to: – 2400+ URLs in the week from 4/13 (when it […]

Read more ...

An SMS-sending Trojan, which targets mobile devices with Java midlet installed, has been circulating in Malaysia. Some victims reported that they have been receiving an SMS message which appears to be an update from Samsung. A message that appears as an update from Samsung But upon clicking the link, they are redirected to another link […]

Read more ...

Another fake printer spam leading to malware.. From:     CheyanneDelasancha@hotmail.com Date:     23 April 2012 13:18 Subject:     Re: Fwd: Scan from a HP ScanJet #352369989 A document was scanned and sent to you using a Hewlett-Packard QJet 8125331KSent to you by: CAMERON Pages : 9 Filetype(s): Images (.jpeg)  Download Location: MSK.3FL. Device: DEV674O1JF7863855Mailprint: 1169d03a-fe6923a5                                     = A document […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments