The Latest in IT Security

Posts Tagged ‘mobile device’

SpyEye and Zeus are probably the most prevalent and active Trojan “banker” families seen in the wild. (Bankers steal bank passwords and other financial data.) At the beginning of the year there was a rumor about the “merger” of both toolkits into a new generation of banking Trojan. It is not clear yet whether leaked […]

Read more ...

The One-Click Billing fraud, a scheme known to target PC users in Japan, now appears to target smartphone users as well.The scheme, as its name suggests, tricks a victim into registering and paying for a certain service after being falsely led into a specific website. Instances of successful attacks have been increasing in Japan since […]

Read more ...

In the computer industry, truth is sometimes stranger than fiction. (In computer security, truth is often stranger than fiction, as almost any random sample of spam will reveal – regular readers will surely remember the Are You Dead email which perplexed us back in April.) Apple, as you probably haven’t been able to avoid knowing, […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments