The Latest in IT Security

Posts Tagged ‘mongolia’

This spam leads to malware on ganiopatia.ru: Date:      Mon, 26 Nov 2012 02:31:10 -0500 From:      [email protected] Subject:      RE: ALINA – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most recent schedule. ALINA Prater, […]

Read more ...

This fake Facebook (or is it Habbo?) spam leads to malware on ceredinopl.ru: Date:      Thu, 22 Nov 2012 01:30:38 -0700 From:      Habbo Hotel [[email protected]] Subject:      You have notifications pending facebook Hi, Here’s some activity you may have missed on Facebook. REFUGIA MERRILL has posted statuses, photos and more on Facebook. Go To […]

Read more ...

Modified versions of the Enfal malware, which figured prominently in the LURID attacks, were seen to have infected more than 800 systems worldwide. Enfal variants are known to communicate to specific servers that gives potential attackers access and even full control of infected systems.We recently uncovered several attacks that used a modified version of Enfal, […]

Read more ...


Categories

SATURDAY, MAY 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments