The Latest in IT Security

Posts Tagged ‘keylogger’

Code signing certificates are used to authoritatively identify a software publisher and to guarantee that the content the certificate signs has not been tampered with between the time it was signed and the time the user executes it. Unfortunately, we see more and more malware signed using fraudulently obtained or stolen code signing certificates. We […]

Read more ...

This fake SendSecure Support / Bank of America spam comes with a malicious attachment called secure_message_02202013_01590106757637303.zip:Date:      Wed, 20 Feb 2013 11:23:43 -0400 [10:23:43 EST]From:      SendSecure Support [SendSecure.Support@bankofamerica.com]Subject:      You have received a secure message from Bank Of AmericaYou have received a secure message.Read your secure message by opening the attachment. You will be […]

Read more ...

Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit.Page source from gyalwarinpoche.com:Here’s a screenshot of gyalwarinpoche.com from Google’s cache:Note: Google’s November 27th snapshot also includes a link to the malicious exploit […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments