The Latest in IT Security

Posts Tagged ‘malicious content’

Recently I blogged about how attackers are forcing users to download fake codecs to spread malicious content. I’ve also encountered across another drive by download attack vector, which uses Java applets to execute downloaded malicious content on the victim’s machine. Download and execution of malicious content happens without user interaction. Let’s take look at a […]

Read more ...

During the Republican Presidential Debate on November 9. 2011, Rick Perry’s speech garnered plenty of attention — but probably not the kind he sought.Social Media has popularized this YouTube video, with the number of views skyrocketing to 1.7 million in just two days, thereby making it a new member of the Viral Video category as […]

Read more ...

One of the most prevalent scripts we have been seen used to compromise legitimate web sites over the past few months is something our products block as Mal/Iframe-W. The threat name describes the payload – some iframe, to load content from a remote site. In this blog, I will elaborate a little more on the […]

Read more ...


Categories

SATURDAY, JUNE 07, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments