The Latest in IT Security

Posts Tagged ‘mdash’

Acting on a tip, a member of our Threat Research team (Brod) has discovered a Dalai Lama related website is compromised and is pushing new Mac malware, called Dockster, using a Java-based exploit.Page source from gyalwarinpoche.com:Here’s a screenshot of gyalwarinpoche.com from Google’s cache:Note: Google’s November 27th snapshot also includes a link to the malicious exploit […]

Read more ...

The Berlin Police Department issued a press release this past Tuesday about criminal complaints of fraudulent cash withdrawals. All of the cases involved SMS mTans and Android smartphones.Original; Google TranslateIt sounds to us like a case of ZeuS in the Mobile (Zitmo), sometimes also called ZeuS Man in the Mobile (ZeuS Mitmo). We first wrote […]

Read more ...

Cybercriminals have for some time now recognized that ransomware can be a highly profitable endeavor. This has led to a significant increase of different ransomware in the wild with no sign of it leaving the threat landscape anytime soon.So, how effective is ransomware on Windows 8 compared to other operating systems? To answer this question, […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments