The Latest in IT Security

Posts Tagged ‘mdash’

We have recently observed a run of spam that is trying to capitalize on the new social networking platform provided by Google, named Google+. The spam samples are similar to other social network spam messages, which are discussed in one of our previous blogs. Currently, Google is trialing their new venture with limited users; therefore, […]

Read more ...

Modification of the hard drive areas responsible for the initial loading of the system has become increasing popular with cybercriminals. Moreover, cybercriminals have now moved on from just modifying the MBR (master boot record) to infecting the code of the NTFS loader. We recently discovered an interesting piece of malware — Cidox. It is peculiar […]

Read more ...

We’ve (re)discovered an interesting new run of Facebook CPA survey spam. It uses this subject line: This girl killed herself after her dad posted a secret of her on her fb wall. The spammer used this template two weeks ago and it then linked to a webpage hosted at thedominio.info. Today, the spam links to […]

Read more ...


Categories

FRIDAY, MARCH 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments