The Latest in IT Security

Posts Tagged ‘nefarious activities’

Netflix customers are targeted lately by well-crafted phishing emails that can easily fool them at a first glance.Cybercriminals have become more sophisticated in their nefarious activities as they set up fraudulent web pages that are very similar to the original ones, and email message crafted to look genuine.The scheme is a classic one: crooks send […]

Read more ...

The Chinese Valentines Day was on August 2 this year and it was the perfect opportunity for cybercriminals to conduct nefarious activities, as they delivered an SMS worm for Android that spread faster than love, affecting a total of 500,000 devices in about six hours.Security researchers analyzing a sample observed that the malware contained two […]

Read more ...

Exotically named hacking tools such as Low Orbit Ion Cannon and #RefRef have garnered plenty of headlines over the last few months but a new report suggests that the world’s favourite search engine might be an equally important weapon in the arsenal of cyber-criminals and hacktivists. The report explains how a simple search on Google […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments