The Latest in IT Security

Posts Tagged ‘mobile devices’

In a previous post, “Fake apps: Behind the effective social strategy of fraudulent paid-archives,” we exposed the social engineering technique behind Win32/Pameseg – our detection for a family of “paid-archives.” We described the use of “low-ball” techniques and explained how users are led to believe they are making an informed choice. However, the choice ultimately leads to […]

Read more ...

The email Potential victims receive an email with an impersonal form of address and more or less detailed information about the EV-SSL certification process. G Data SecurityLabs have registered four different email designs so far. Here is a selection of subject lines encountered so far: EV-SSL-Zertifikat-App im Smartphone Betriebssystem EV-SSL-Zertifikat. Smartphone Betriebssystem Extended Validation-Zertifikate im […]

Read more ...

We’ve spotted an uptick in a particular type of threat hitting Twitter uses in Japan. We call this threat the “browser crasher” after what it does: it causes the browser to “hang/crash”. To do this, the user has to be lured to visit a particular site with the JavaScript code. So long as the browser […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments