The Latest in IT Security

Posts Tagged ‘logs’

Another item in the post-vacation queue for the blog is an update on the big Fake AV attack we posted about at the beginning of the month. From last Friday's logs, I pulled data on one sample server. Here's what it had been up to: – 2400+ URLs in the week from 4/13 (when it […]

Read more ...

Earlier this week, Dr.Web reported the discovery of a Mac OS X botnet Flashback (Flashfake). According to their information, the estimated size of this botnet is more than 500, 000 infected Mac machines. We followed up with an analysis of the latest variant of this bot, Trojan-Downloader.OSX.Flashfake.ab. It is being distributed via infected websites as […]

Read more ...

Time for a quick blog post on an attack we've been following for several weeks now. I've seen a few news articles and blog posts that could be describing it, at least in general terms (i.e., hacked WordPress sites redirecting victims to Fake AV malware sites), so let's flesh it out a bit. (It's also […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments