The Latest in IT Security

Posts Tagged ‘malicious attachment’

The demise of Beastie Boys’ Adam Yauch (also known by his moniker MCA) have resonated among hip hop fans these past days. Sadly, we have seen a particular attack that targets specific recipients and used this news item as a social engineering lure. We have found an email sample that leverages Yauch’s death to entice […]

Read more ...

Targeted Attack Uses Recent Adobe Flash Player Vulnerability (CVE-2012-0779) Reports of a targeted attack surfaced recently. One such attack arrives as an email message that trick users into executing a malicious attachment. The malicious attachment, as expected, is a file that exploits CVE-2012-0779, found in several versions of Adobe Flash Player. Exploitation results to a […]

Read more ...

The first spring month in 2012 was unusually “hot” with the emergence of a whole series of new threats to Windows and other platforms. In particular, attackers came up with another way to spread Trojans for Mac OS X, and new malicious applications for Android were discovered. In early March, immediately following the Russian presidential […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments