The Latest in IT Security

Posts Tagged ‘Pharmacy’

07
Sep
2011

In their attempts to bypass e-mail filtering systems and deliver their information to users, spammers often resort to all sorts of tricks. Although really new tricks (such as distributing mp3 files with voice-generated messages) are relatively uncommon, sometimes they do come up. Kaspersky Lab analysts have recently come across a few curious samples. While masking […]

Read more ...

Spam and malware distribution is a business. So if something works then don’t change it. We speculate that these attacks work since our labs have seen them repeated almost unchanged for months now. (See this post about Twitter spam and this post about twitter spam). The recipe for success when you’re trying to get people […]

Read more ...

Our friends at Commtouch have blogged about something that is no surprise – spammers using compromised accounts vs. bots (their latest threat report is quite good and worth reading btw). While compromised email accounts (hotmail, yahoo, gmail, etc.) are not new, there is a little more to it:  There was a massive takedown of a […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments