The Latest in IT Security

Posts Tagged ‘internet explorer’

Microsoft is releasing 9 Security Bulletins this month (MS12-008 through MS12-016), patching a total 21 vulnerabilities. Some of these vulnerabilities may enable remote code execution (RCE) in limited circumstances, and offensive security researchers have claimed that a “bug” fixed this month should be client-side remote exploitable, but after months of public circulation, there have been […]

Read more ...

This spam comes with a malicious attachment that attempts to download malware from ckolmadiiasf.ru:8080/images/aublbzdni.php Date:      Mon, 12 Feb 2012 07:57:23 +0700 From:      scan@victimdomain.com Subject:      Fwd: Scan from a Xerox W. Pro #6999878 Attachments:     Xerox_Doc-l1616.htm Please open the attached document. It was scanned and sent to you using a Xerox WorkCentre Pro. […]

Read more ...

Here’s a slightly new twist on a very familiar theme, with an email attachment that contains an HTML page with obfuscated javascript.. leading to malware. Date:      Sun, 11 Feb 2012 12:26:18 +0100 From:      “JANICE Heller” [KailaStuck@engineeringdesign.com] Subject:      Re: Scan from a Xerox WorkCentre Pro #383806 Attachments:     Xerox_Doc_X30366.htm Please open the attached […]

Read more ...


Categories

MONDAY, MARCH 31, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments