The Latest in IT Security

Posts Tagged ‘invitations’

In what may very well be the first major cybercriminal campaign exploiting the Google+ brand, spammers are sending out bogus Google+ invitations that in reality point to online pharmacies. The messages look similar to the real emails that users may receive from friends who are already members of Google+. However, clicking on the links will […]

Read more ...

People say there is no such thing as a free lunch, and as we’ve recently found out, there’s no such thing as free supper either. We’ve recently come across a spam run that uses a nonexistent promotion from popular fastfood chain McDonald’s to convince users to execute a malicious file. The spammed email messages are […]

Read more ...

Security vendor Trusteer blogged about a wave of fake LinkedIn emails that download malware on to your computer. The images Trusteer shows of the phish demonstrate how tricky the criminals are and how authentic the message looks, yet just yesterday I shared with you a foolproof method to prevent yourself from falling victim to such […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments