The Latest in IT Security

Posts Tagged ‘malicious activity’

Last year, a variant of OSX/Imuler has been discovered and masquerades as an innocent PDF Document. Recently, a new variant of OSX/Imuler has been discovered and masquerading as image files of the popular Russian model Irina Shayk. The malicious application is placed inside a ZIP archive together with other various image files taken from the […]

Read more ...

This week we have detected another interesting attack vector. This time cybercriminals are using an interesting technique for hiding malicious Javascripts and employ implicit iFrame injection. At this moment we are tracking hundreds of infected legitimate web sites in the Russian internet segment using this technique of infection. Let’s analyze this attack method step by […]

Read more ...

More fake NACHA spam, this time with a malicious payload on the domain beaverday.biz. From:  The Electronic Payments Association office@officecar.ro Reply-To:  The Electronic Payments Association To:  itd@sos.com.ph Date:  13 February 2012 10:06 Subject:  ACH transfer error Dear Chief Accounting Officer, We are sorry to inform you, that Direct Deposit payment (ID801400587332) has not been credited […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments