The Latest in IT Security

Posts Tagged ‘malicious activity’

The operators of malicious networks are continuously monetizing their activities by propagating rogue security software that use scare tactics to trick unsuspecting users into installing and purchasing fake antivirus software, aka FAKEAV.Although there has been a decline in the FAKEAV volume as a result of the increasing pressure on payment processors that handle credit card transactions […]

Read more ...

With the popularity of the WordPress blogging platform, security researchers here at WebsenseR Security Labs T are sure to sit up and take note of any reported zero-day threats affecting the platform itself or the plugins used by blog masters.Recently, we saw a post by Mark Maunder of technology company, Feedjit, where he noticed a […]

Read more ...

Normally, a “mirror site” is a site that “mirrors” (copies) the content of another site, as a form of backing up important data, or helping to spread the bandwidth load for popular content. A few weeks ago, however, I was seeing something interesting in one of the shady networks we track. Take a look at […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments