The Latest in IT Security

Posts Tagged ‘Infrastructure’

This fake LinkedIn email leads to malware on the oddly named domain of mysqlfordummys.ru: Date:      Thu, 2 Aug 2012 02:27:38 -0300 From:      LinkedIn Password [password@linkedin.com] Subject:      Reset Your LinkedIn Password LinkedIn Hi altera, Can’t remember your LinkedIn password? No problem – it happens. Please use this link to reset your password within […]

Read more ...

ZeroAccess is a sophisticated kernel-mode rootkit that is quickly becoming one of the most widespread malware threats.In a new technical paper from SophosLabs, malware researcher James Wyke explores the ZeroAccess threat, examines how it works and looks at what the malware’s ultimate goal is.ZeroAccess has a resilient peer-to-peer command and control infrastructure, runs on both […]

Read more ...

Zscaler Safe Shopping, the browser extension that warns users when they visit a fake store or compromised store, was Firefox, Google Chrome, Safari and Opera. It is now available for Internet Explorer 6 to 9 (Windows XP, Vista and 7). This is the first extension we released for Internet Explorer, and hopefully not the last […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments