The Latest in IT Security

Posts Tagged ‘ip addresses’

This spam leads to malware on podarunoki.ru: Date:      Fri, 30 Nov 2012 04:54:30 -0300 From:      Jone Castaneda via LinkedIn [member@linkedin.com] Subject:      RE: Leonie – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most […]

Read more ...

This spam leads to malware on ganiopatia.ru: Date:      Mon, 26 Nov 2012 02:31:10 -0500 From:      sales1@victimdomain.com Subject:      RE: ALINA – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most recent schedule. ALINA Prater, […]

Read more ...

This fake printer message leads to malware on donkihotik.ru: Date:      Wed, 31 Oct 2012 05:06:42 +0300 From:      LinkedIn Connections Subject:      Re: Fwd:Scan from a HP ScanJet #26531Attachments:     HP-Scan-44974.htm Attached document was scanned and sent to you using a Hewlett-Packard Officejet PRO. Sent: by BriaImage(s) : 6Attachment: Internet Explorer file [.htm] Hewlett-Packard […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments