The Latest in IT Security

Posts Tagged ‘network traffic’

This fake wire transfer spam comes with a malicious attachment:Date:      Tue, 30 Apr 2013 15:27:44 -0500 [16:27:44 EDT]From:      Federal Reserve [alerts@federalreserve.gov]Subject:      Your Wire Transfer 82932922 canceledThe Wire transfer , recently sent from your bank account , was not processed by the FedWire.Transfer details attached to the letter.This service is provided to you […]

Read more ...

Evasion is always a goal of cybercriminals. They are not above misusing legitimate sites and services to hide malicious activities. One recent example would be BKDR_VERNOT.A, which tried to use Evernote to hide its activities. Another variant of this malware was recently spotted, but this variant uses a Japanese blogging platform as its command-and-control (C&C) […]

Read more ...

While the actual Bitcoin currency might have its ups and downs, the notion that it is real actual money has by now been firmly implanted in the minds off miscreants everywhere, as shown by the steady increase in the number of detected btc stealer trojan samples: The Trojan.Dropper.PWS e-threat comes in a packed dropper which […]

Read more ...


Categories

FRIDAY, APRIL 04, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments