The Latest in IT Security

Posts Tagged ‘mongolia’

This fake Sendspace spam leads to malware on pelamutrika.ru: Date:      Fri, 7 Dec 2012 10:53:57 +0200 From:      Badoo [noreply@badoo.com] Subject:      You have been sent a file (Filename: [victimname]-64.pdf) Sendspace File Delivery Notification: You’ve got a file called [victimname]-792244.pdf, (337.19 KB) waiting to be downloaded at sendspace.(It was sent by CHASSIDY PROCTOR). You […]

Read more ...

This fake Facebook spam leads to malware on francese.ru: Date:      Tue, 4 Dec 2012 03:38:42 +0000From:      KaseyElleman@victimdomain.comSubject:      You have notifications pending facebookHi,Here’s some activity you may have missed on Facebook.SALLIE FELIX has posted statuses, photos and more on Facebook.Go To Facebook    See All NotificationsThis message was sent to postinialerts@[redacted]. If you don’t […]

Read more ...

This spam leads to malware on podarunoki.ru: Date:      Fri, 30 Nov 2012 04:54:30 -0300 From:      Jone Castaneda via LinkedIn [member@linkedin.com] Subject:      RE: Leonie – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments