The Latest in IT Security

Posts Tagged ‘machine location’

Another fake OfficeJet spam with a malicious attachment: Date:      Fri, 9 Mar 2012 05:40:05 +0100 From:      “Valentino CONNELLY” Subject:      Scan from a HP Officejet #235612 Attachments:     HP_Document_SPK23127.htm Attached document was scanned and sent to you using a Hewlett-Packard HP Officejet 2975OF. Sent: by Valentino Image(s) : 1 Attachment: HTML [.htm] Hewlett-Packard […]

Read more ...

Another spam run with a malicious attachment: Date:      Fri, 16 Feb 2012 11:24:56 +0700 From:      “VICTOR TALLEY” Subject:      Scan from a Hewlett-Packard Officejet 3906171 Attachments:     HP_Scan-02.16_N05556.htm Attached document was scanned and sent to you using a Hewlett-Packard HP Officejet 97687P. Sent by: VICTOR Images : 9 Attachment Type: .HTML [Internet Explorer] […]

Read more ...

This spam comes with a malicious attachment that attempts to download malware from ckolmadiiasf.ru:8080/images/aublbzdni.php Date:      Mon, 12 Feb 2012 07:57:23 +0700 From:      [email protected] Subject:      Fwd: Scan from a Xerox W. Pro #6999878 Attachments:     Xerox_Doc-l1616.htm Please open the attached document. It was scanned and sent to you using a Xerox WorkCentre Pro. […]

Read more ...


Categories

WEDNESDAY, MAY 08, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments