The Latest in IT Security

Posts Tagged ‘local time’

This fake IRS spam (from an office on “Cum Avenue”!) actually leads to malware on azsocseclawyer.net: Date:      Fri, 15 Feb 2013 09:47:25 -0500 From:      Internal Revenue Service [[email protected]] Subject:      pecuniary penalty for delay of tax return filling Herewith we are informing you that you are required to pay a surcharge for not […]

Read more ...

Another IRS spam run leading to malware, this time on pollypeach.com. Date:      Tue, 27 Feb 2012 17:02:45 +0600 From:      “Ofelia Childers” Subject:      IRS notification of your tax appeal status. Dear Accountant Officer, Hereby you are notified that your Income Tax Return Appeal id#0184348 has been REJECTED. If you believe the IRS did […]

Read more ...

It did not take too long after I found out about the discovery of Gingermaster, the first Android malware to use the Gingerbreak exploit, to acquire a sample which was still available from a Chinese alternative Android Marketplace. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS […]

Read more ...


Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments