The Latest in IT Security

Posts Tagged ‘malicious attachments’

In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices. We have since been examining how the Trojan is distributed and discovered that the malware owners have developed a technique […]

Read more ...

Following yesterday's news, the Duke and Duchess of Cambridge are now the proud parents of a baby boy and future heir to the British throne. While they revel in the joy of being a family, cyber-criminals have predictably been busy delivering various malicious campaigns in order to piggyback on the news. The Websense ThreatSeeker® Intelligence Cloud […]

Read more ...

This fake Wells Fargo spam run comes with one of two malicious attachments:Date:      Mon, 10 Jun 2013 13:00:13 -0500 [14:00:13 EDT]From:           Anthony_Starr@wellsfargo.comSubject:      IMPORTANT – WellsFargoPlease check attached documents.Anthony_StarrWells Fargo Advisors817-563-9816 office817-368-5471 cell Anthony_Starr@wellsfargo.comATTENTION: THIS E-MAIL MAY BE AN ADVERTISEMENT OR SOLICITATION FOR PRODUCTS AND SERVICES.To unsubscribe from marketing e-mails from:.         An […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments