The Latest in IT Security

Posts Tagged ‘opening attachments’

During the holidays season many people receive packages from the post or delivery services. We wrote about the dangers introduced by opening attachments in emails pretending to come from such entities. Without an active and up to date security software, attachments in email should never be open, no matter from where they come. We also […]

Read more ...

Russian anti-virus company Doctor Web is warning users about a new Trojan horse for Mac OS X. This application can perform backdoor tasks and execute commands issued by a remote, hacker-controlled server. Back in late June, Doctor Web’s anti-virus laboratory received a sample e-mail message with a malicious program attached targeting Mac OS X. This […]

Read more ...

Threat Analysis: Alan Neville As word spreads of the death of Muammar Gadhafi, cybercriminals are starting to take advantage. We are already seeing spam campaigns related to his death with malicious attachments. Here are a couple of examples of what we have seen so far. This particular campaign claims that Muammar Gadahfi’s death may not […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments